Learning the OWASP Top 10

Learning the OWASP Top 10

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 0h 43m | 120 MB

It seems like there is a security-related incident in the news every day. What makes systems—and the software that runs them—vulnerable to attack? The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand and improve software security. The OWASP Top 10 list describes the ten biggest vulnerabilities. In this course, application security expert Caroline Wong provides an overview of the 2017 OWASP Top 10, presenting information about each vulnerability category, its prevalence, and its impact. Though aimed at IT security professionals and developers, anyone who uses web applications will benefit from an understanding of these risks.

Table of Contents

Introduction
1 Welcome
2 OWASP and the OWASP Top 10

The Top 10
3 Injection
4 Broken authentication and session management
5 Sensitive data exposure
6 XML external entity (XXE)
7 Broken access control
8 Security misconfiguration
9 Cross-site scripting
10 Insecure deserialization
11 Using components with known vulnerabilities
12 Insufficient logging and monitoring

Conclusion
13 Next steps