Companies Home Search Profile

Introduction to the OWASP Top 10 – 2021

Focused View

Jim Manico

1:42:07

8 View
  • 1.1 100 00 - Introduction Handout.pdf
  • 1. Introduction.mp4
    08:00
  • 2. Making of the OWASP Top 10 2021.html
  • 3.1 100 01 - A1 Broken Access Control.pdf
  • 3. Risk A1 Broken Access Control.mp4
    06:26
  • 4. Access Control Practice Test.html
  • 5.1 100 02 - A2 Cryptographic Failures.pdf
  • 5. Risk A2 Cryptographic Failures.mp4
    07:13
  • 6. Advanced Encryption Standard (AES) Security.html
  • 7.1 100 03 - A3 Injection.pdf
  • 7. Risk A3 Injection.mp4
    07:11
  • 8. Many Forms of Injection.html
  • 9.1 100 04 - A4 Insecure Design.pdf
  • 9. Risk A4 Insecure Design.mp4
    09:01
  • 10. Insecure Design Practice Test.html
  • 11.1 100 05 - A5 Security Misconfiguration.pdf
  • 11. Risk A5 Security Misconfiguration.mp4
    08:08
  • 12. Misconfiguration in Application Security.html
  • 13.1 100 06 - A6 Vulnerable and Outdated Components.pdf
  • 13. Risk A6 Vulnerable and Outdated Components.mp4
    08:14
  • 14. Vulnerable & Outdated Components Quiz.html
  • 15.1 100 07 - A7 Authentication and Identification Failures.pdf
  • 15. Risk A7 Authentication and Identification Failures.mp4
    08:58
  • 16. Authentication and Identification Security Quiz.html
  • 17.1 100 08 - A8 Software and Integrity Failures.pdf
  • 17. Risk A8 Software and Integrity Failures.mp4
    09:06
  • 18. Integrity Failures in Application Security.html
  • 19.1 100 09 - A9 Security Logging and Monitoring Failures.pdf
  • 19. Risk A9 Security Logging and Monitoring Failures.mp4
    10:06
  • 20. Security Logging in Application Security.html
  • 21.1 100 10 - A10 Server-Side Request Forgery.pdf
  • 21. Risk A10 Server-Side Request Forgery.mp4
    08:16
  • 22. Server-Side Request Forgery Quiz.html
  • 23.1 100 11 - Further Reading Materials.pdf
  • 23. Summary What We Learned.mp4
    11:28
  • Description


    Learn the OWASP Top 10 Risks

    What You'll Learn?


    • Some of the best protection strategies that help avoid each OWASP Top 10 risk from materializing
    • The main challenges that cause each OWASP Top 10 risk
    • Examples of good and bad code for each OWASP Top 10 risk using pseudocode
    • Definition of each of the OWASP Top 10 risk
    • What are the key information security concepts required to understand each OWASP Top 10 risk
    • What are the OWASP Top 10 risks and how this list gets periodically updated
    • What is the OWASP Foundation and how you can be part of this open-source community

    Who is this for?


  • This course has no technical prerequisites, it is truly meant for everyone
  • Beginner web application and API developers
  • Risk managers and auditor looking to understand the OWASP Top 10 risks
  • Cybersecurity professionals looking for an introduction to the OWASP Top 10
  • What You Need to Know?


  • No programming experience needed you will learn everything you need to know
  • Curiosity on web application security risks
  • More details


    Description

    Welcome to this beginner course on the OWASP Top 10, as it was last updated in 2021 almost beginning of 2022. This course has no technical prerequisites, it is truly meant for everyone. Whether you are a risk manager, an auditor, a cybersecurity professional, or maybe you are a software developer or simply curious on application security and looking for an introduction to the OWASP Top 10: This course is for you!

    In this course you will learn a little bit about the OWASP Foundation and how you can be part of this opensource community. We are going to learn what are the OWASP Top 10 risks of 2021 and how this list of risks gets periodically updated.

    For each of the OWASP Top 10 risks, we are going to look at the key information security concepts, so that you better understand the definition of each risk. Then we are going to – together – define each risk – and we are going to do this in layman’s terms, so that you really understand each risk.

    We are also going to look at the main challenges that developers and others face that cause each risk. Finally, we are going to give examples of good and bad code using pseudocode and we are going to conclude with some of the best protection practices to help you and your team avoid each risk from materializing.

    Who this course is for:

    • This course has no technical prerequisites, it is truly meant for everyone
    • Beginner web application and API developers
    • Risk managers and auditor looking to understand the OWASP Top 10 risks
    • Cybersecurity professionals looking for an introduction to the OWASP Top 10

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also an investor/advisor for 10Security, Aiya, MergeBase, Nucleus Security, KSOC, and Inspectiv. Jim is a frequent speaker on secure software practices, is a member of the Java Champion community, and is the author of "Iron-Clad Java: Building Secure Web Applications" from Oracle Press. Jim also volunteers for the OWASP foundation as the project lead for the OWASP Application Security Verification Standard and the OWASP Cheatsheet Series.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 12
    • duration 1:42:07
    • Release Date 2024/04/13