Published 2/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 2.42 GB | Duration: 2h 30m
An introduction to the OWASP Top 10 risks, attacks and how to mitigate them. What you'll learn Understanding of the OWASP organization and their Top10 List How to identify attacks by their category How to mitigate vulnerabilities in the OWASP Top10 How to improve your organization to address these known vulnerabilities earlier Requirements Interest in understanding of security concepts No coding or programming experience needed Open mind and a willingness to learn application security Description The OWASP Top 10 is the go-to document on application security awareness. This cours features the OWASP Top 10 2021 version explained with examples. Boost your DevSecOps and improve your threat hunting capabilities based on the findings from the OWASP community. However, use the OWASP Top 10 wisely. Although packed with useful information, the OWASP Top 10 is not a substitute for application security testing techniques or managed detection and response services. Instead, use the OWASP Top 10 in conjunction with professional cyber security protocols to get the best out of your application security. Within a few hours, you will be able to explain web application security without having to code. For your convenience:I will teach you the 10 most common risks and vulnerabilities identified by the Open Web Application Security Project (OWASP). This course will give your coding and testing a huge security head start!Overview1) Understand the OWASP top 10,2) Learn how each risk is attacked by hackers and pentesters, 3) Explain how these security threats can be mitigatedContentBroken Access ControlCryptographic FailuresInjectionInsecure DesignSecurity MisconfigurationVulnerable and Outdated ComponentsIdentification and Authentication FailuresSoftware and Data Integrity FailuresSecurity Logging and Monitoring FailuresServer-Side Request ForgeryI'm so excited to be able to share my experiences with you within InfoSec and Application Security.Enroll now, and I promise to help you on your Web Application Security journey!Cheers,Andy Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 What is OWASP? Lecture 3 What is OWASP Top10? Lecture 4 Tools to follow along Section 2: The List Lecture 5 Broken Access Control Lecture 6 Cryptographic Failures Lecture 7 Injection Lecture 8 Insecure Design Lecture 9 Security Misconfiguration Lecture 10 Vulnerable and Outdated Components Lecture 11 Identification and Authentication Failures Lecture 12 Software and Data Integrity Failures Lecture 13 Security Logging and Monitoring Failures Lecture 14 Server-Side Request Forgery (SSRF) Section 3: Wrap Up Lecture 15 Shift-Left & DevSecOps Lecture 16 Thank you (Project) managers that lead software projects,Software architects that want to explain the OWASP top 10 to product owners,Software eeers that want to advance their career,Anyone interested in the basics of web application security, explained in layman’s terms,Pentesters / Red team that need foundational understanding,Recruiters that want to challenge software eeers,Product Owners that care about their product HomePage:
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.