Published 3/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 331.74 MB | Duration: 1h 0m
Quick guide to the OWASP Top Ten and Application Security What you'll learn Awareness of what Application Security is and how it's used Some historical context on Application Security Basic terms used in AppSec What a Secure SDLC and DevSecOps pipeline look like Quick view of OWASP and the OWASP Top Ten Web App vulnerabilities Requirements Some programming experience Some familiarity with development practices Some familiarity with cybersecurity Description Every company uses software to function. Whether they are a Fortune 500 technology company or a sole proprietor landscaping company, software is integral to businesses large and small. Software provides a means to track employees, customers, inventory, and scheduling. Data moves from a myriad of systems, networks, and software providing insights to businesses looking to stay competitive. Some of that software used is built within the organization or it is purchased and integrated. What this means is that every organization, regardless of size and industry, has a software need. It enables organizations to move quickly and stay ahead of their competition.This is where organizations need your help to secure their applications!In this quick guide to application security and the OWASP Top Ten we will cover what is in the Top Ten. We’ll cover what makes them vulnerabilities and how to protect your application from attacks using these vulnerabilities. Well talk about cryptographic failures, insecure configuration, how to maintain software integrity, what injection attacks are and more!You’ll learn about the terms and security goals that are used in an organization. You’ll learn about some of the basic ways that application security can be brought into the development lifecycle both from a traditional pipeline and from a DevSecOps perspective. I hope you enjoy this brief but key course on AppSec. Overview Section 1: Introduction Lecture 1 Introduction Section 2: About Application Security Lecture 2 AppSec Terms Lecture 3 About AppSec Lecture 4 About OWASP Section 3: OWASP Top Ten 2021 Lecture 5 Broken Access Controls Lecture 6 Cryptographic Failures Lecture 7 Injection Lecture 8 Insecure Design Lecture 9 Security Misconfiguration Lecture 10 Insecure Dependencies Lecture 11 Insecure Authentication Lecture 12 Software Integrity Failures Lecture 13 Logging and Monitoring Failures Lecture 14 Server-side Request Forgery Section 4: Conclusion Lecture 15 Conclusion Software Developers,Software Architects,Quality Assurance Testers HomePage:
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.