

Published 6/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.48 GB | Duration: 6h 16m
Learn OWASP Top 10 2021 & OWASP Top 10 2017, Understand the most critical Security Vulnerabilities in Web Applications
What you'll learn
OWASP Top 10 2021
OWASP Top 10 2017
OWASP API Security Guidelines
Practical tips and trics
Real-life examples of vulnerabilities and prevention of vulnerabilities
Secure Coding Practices with Java Examples
How to produce secure code for Web Application
Security Guidelines and Standards
The most common security threats and vulnerabilities
Threat modelling
How to build efficient process in your team to create Secure Design
Requirements
Basic understanding of how Web works
Knowledge of one of the programming languages for web development
Description
From this course, you can learn OWASP Top 10 Web API Security.There are a lot of other courses on this topic. So, why would you choose exactly this course? Here are just a few reasons:- Coding examplesTo learn to program is not enough just watching videos and reading books. You also need to have a lot of practice. In this training course, you will review multiple practical tasks and coding examples which will help you learn and understand Java better.- Open source codeWe hide nothing from our students! Including the source code for the home task solutions and source code of examples that were shared during the lesson. Having the source code you can just copy and paste it to run it on your local computer to understand how things work better.You are allowed to use all source code examples for learning purposes. This helps significantly to configure the environment and make tests work, especially in case students didn't work with any testing framework in the past.- Q&A support The significant difference between the online and offline learning process is the instructor's availability. If you are in one room with a tutor he always can help you to get understand the specific concept or to help fix your code on your computer. In this course, we are supporting students with answers to any questions flagged in the Q&A section. In case there will be recurring questions - separate video lessons will be created to show how to address the issue. So with this course you are not just getting video materials, code exercises, source code, access to the free mobile application without limits (which is still pretty cool, huh?
Overview
Section 1: Introduction
Lecture 1 Communication plan
Lecture 2 Unlimited access to 'Learn IT' application for students
Section 2: OWASP Top 10
Lecture 3 OWASP Top 10: Overview
Section 3: A01:2021-Broken Access Control
Lecture 4 Broken Access Control
Section 4: A02:2021-Cryptographic Failures
Lecture 5 Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures)
Lecture 6 Cryptography Failures (Practical Examples, SQL Injections, TLS/SSL, HTTPS)
Lecture 7 Cryptography Failures (Examples, Password Encryption, Hashing, Salting)
Section 5: A03:2021-Injection
Lecture 8 Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection)
Lecture 9 Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections)
Lecture 10 Injection (XPath Injection, Log Injection, Input Validation)
Section 6: A04:2021-Insecure Design
Lecture 11 Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto)
Lecture 12 Insecure Design (Secure Design Process, Security Controls, Metrics, Examples)
Section 7: A05:2021-Security Misconfiguration
Lecture 13 Security Misconfiguration (Overview, CWEs, Types, Real-life attacks)
Lecture 14 Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice)
Section 8: A06:2021-Vulnerable and Outdated Components
Lecture 15 Vulnerable & Outdated Components
Section 9: A07:2021-Identification and Authentication Failures
Lecture 16 Identification & Authentication Failures
Section 10: A08:2021-Software and Data Integrity Failures
Lecture 17 Software & Data Integrity Failures
Section 11: A09:2021-Security Logging and Monitoring Failures
Lecture 18 Security Logging & Monitoring Failures
Section 12: A10:2021-Server-Side Request Forgery
Lecture 19 Server-Side Request Forgery (SSRF)
Section 13: Bonus Section
Lecture 20 Bonus Lesson
Web Developers,Software Architects,Software Engineers,Quality Assurance Engineers,Project & Delivery Managers
Homepage
Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live
Links are Interchangeable - No Password - Single Extraction