Video description
Unless you try to exploit a vulnerability yourself, no reading will give you the required know-how to fully understand the impact and avoid such weaknesses in your applications.
To become a better professional, you should have a great understanding of the most critical web application security risks. This is mandatory for IT students, job seekers, software developers, testers, and application managers.
The OWASP Top 10 “is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.”
This course follows a hands-on approach: you’ll exploit at least 10 vulnerabilities in a deliberately vulnerable web application. In each session, we will review and briefly discuss a single OWASP Top 10 risk and then you’ll be guided to search and exploit that weakness in the target application. Since you’ll have access to the web application source code, you’ll be able to spot the vulnerable source code and fix it.
After completing this course, you’ll be comfortable answering security-related questions in your next job interview or bring security into your organization and into the Software Development Life Cycle (SDLC).
Table of Contents
Chapter 1: World Wide Web Fundamentals
Course Overview
Introduction to the OWASP Top 10
How the World Wide Web Works?
Chapter 2: Injection Flaws
Threat Analysis
Exploitation
Mitigation
Chapter 3: Broken Authentication
Threat Analysis
Exploitation
Mitigation
Chapter 4: Sensitive Data Exposure
Threat Analysis
Exploitation
Mitigation
Chapter 5: XML External Entities (XXE)
Threat Analysis
Exploitation
Mitigation
Chapter 6: Broken Access Control
Threat Analysis
Exploitation
Mitigation
Chapter 7: Security Misconfiguration
Threat Analysis
Exploitation
Mitigation
Chapter 8: Cross-Site Scripting (XSS)
Threat Analysis
Exploitation
Mitigation
Chapter 9: Insecure Deserialization
Threat Analysis
Exploitation
Mitigation
Chapter 10: Using Components with Known Vulnerabilities
Threat Analysis
Exploitation
Mitigation
Chapter 11: Insufficient Logging Monitoring
Threat Analysis
Exploitation
Mitigation