Companies Home Search Profile

OWASP Mobile Top 10 - Vulnerabilities to Avoid

Focused View

Pack Of Coders - POC

2:17:58

13 View
  • 1. Introduction.mp4
    01:33
  • 2. Course Content and Structure.mp4
    01:58
  • 3. Lesson Quiz and Resources.mp4
    01:01
  • 4. Ethics.mp4
    00:48
  • 5. OWASP Mobile Top 10 - Overview.mp4
    04:33
  • 1. Secure Software Development.mp4
    03:58
  • 2. Addressing Risk.mp4
    06:51
  • 3. Developing Threat Models.mp4
    02:20
  • 4. Encryption 101.mp4
    05:22
  • 1.1 Course Notes - Insecure Authentication Authorization.pdf
  • 1. OWASP Mobile #1 Insecure Authentication Authorization.mp4
    00:49
  • 2. Describing the Vulnerability.mp4
    02:35
  • 3. Threat Modeling.mp4
    03:03
  • 4. Detection and Prevention.mp4
    04:24
  • 5. Quiz - Insecure Authentication Authorization.html
  • 1.1 Course Notes - Insecure Communication.pdf
  • 1. OWASP Mobile #2 Insecure Communication.mp4
    01:02
  • 2. Describing the Vulnerability.mp4
    03:46
  • 3. Threat Modeling.mp4
    02:37
  • 4. Detection and Prevention.mp4
    02:51
  • 5. Quiz - Insecure Communication.html
  • 1.1 Course Notes - Inadequate Supply Chain Security.pdf
  • 1. OWASP Mobile #3 Inadequate Supply Chain Security.mp4
    01:17
  • 2. Describing the Vulnerability.mp4
    02:33
  • 3. Threat Modeling.mp4
    01:51
  • 4. Detection and Prevention.mp4
    02:43
  • 5. Quiz - Inadequate Supply Chain Security.html
  • 1.1 Course Notes - Inadequate Privacy Controls.pdf
  • 1. OWASP Mobile #4 Inadequate Privacy Controls.mp4
    01:07
  • 2. Describing the Vulnerability.mp4
    03:35
  • 3. Threat Modeling.mp4
    04:40
  • 4. Detection and Prevention.mp4
    03:30
  • 5. Quiz - Inadequate Privacy Controls.html
  • 1.1 Course Notes - Improper Credential Usage.pdf
  • 1. OWASP Mobile #5 Improper Credential Use.mp4
    01:16
  • 2. Describing the Vulnerability.mp4
    03:36
  • 3. Threat Modeling.mp4
    02:20
  • 4. Detection and Prevention.mp4
    03:07
  • 5. Quiz - Improper Credential Use.html
  • 1.1 Course Notes - Insufficient IO Validation.pdf
  • 1. OWASP Mobile #6 Insufficient Input Output Validation.mp4
    01:25
  • 2. Describing the Vulnerability.mp4
    02:51
  • 3. Threat Modeling.mp4
    03:20
  • 4. Detection and Prevention.mp4
    03:59
  • 5. Quiz - Insufficient Input Output Validation.html
  • 1.1 Course Notes - Security Misconfiguration.pdf
  • 1. OWASP Mobile #7 Security Misconfiguration.mp4
    01:26
  • 2. Describing the Vulnerability.mp4
    03:50
  • 3. Threat Modeling.mp4
    01:58
  • 4. Detection and Prevention.mp4
    03:43
  • 5. Quiz - Security Misconfiguration.html
  • 1.1 Course Notes - Insufficient Cryptography.pdf
  • 1. OWASP Mobile #8 Insufficient Cryptography.mp4
    01:06
  • 2. Describing the Vulnerability.mp4
    02:27
  • 3. Threat Modeling.mp4
    02:37
  • 4. Detection and Prevention.mp4
    03:52
  • 5. Quiz - Insufficient Cryptography.html
  • 1.1 Course Notes - Insecure Data Storage.pdf
  • 1. OWASP Mobile #9 Insecure Data Storage.mp4
    01:26
  • 2. Describing the Vulnerability.mp4
    02:17
  • 3. Threat Modeling.mp4
    02:32
  • 4. Detection and Prevention.mp4
    04:37
  • 5. Quiz - Insecure Data Storage.html
  • 1.1 Course Notes - Insufficient Binary Protections.pdf
  • 1. OWASP Mobile #10 Insufficient Binary Protections.mp4
    01:26
  • 2. Describing the Vulnerability.mp4
    02:35
  • 3. Threat Modeling.mp4
    04:01
  • 4. Detection and Prevention.mp4
    03:36
  • 5. Quiz - Insufficient Binary Protections.html
  • 1. Conclusion.mp4
    01:48
  • Description


    Skills Necessary to Understand the Most Critical Mobile Application Security Risks

    What You'll Learn?


    • Mobile OWASP Top 10 2023 Coverage
    • Details on Each Vulnerability and Strategies for Prevention
    • Learn to Threat Mode Each of the Mobile Applications Vulnerabilities
    • Identify Best Practices for Secure Mobile Application Design and Coding
    • Learn to Integrate Security into the Mobile Development Life Cycle
    • Concepts to Support Building Secure iOS and Android Applications
    • Find Out How to Apply Best Practices to Detect Vulnerabilities

    Who is this for?


  • Mobile App Developers
  • Software Developers
  • Architects
  • Security Professionals
  • IT Professionals
  • Anyone Interested in Secure Mobile Development
  • What You Need to Know?


  • All Levels
  • More details


    Description

    Stay ahead of the curve in the ever-evolving world of mobile application security with our OWASP Mobile Top Ten training. Designed for security professionals, developers, and mobile app testers, this comprehensive course will equip you with the knowledge and skills necessary to understand and mitigate the most critical security risks facing mobile applications today.


    Course Highlights:

    OWASP Mobile Top Ten: Dive deep into the OWASP Mobile Top Ten, a list of the most critical security risks for mobile apps. Learn about vulnerabilities such as insecure authentication, code tampering, flawed encryption, and more!


    Understanding Mobile Application Security: Explore the unique challenges and risks associated with mobile app development, including data leakage, insecure data storage, and more.


    Risk Assessment and Mitigation: Discover how to assess the risks associated with mobile app development and implement effective mitigation strategies to safeguard your applications and users.


    Secure Coding Practices: Gain practical insights into secure coding practices for mobile app development, covering topics like input validation, authentication, authorization, and encryption.


    Best Practices for Secure Development: Acquire a set of best practices for integrating security into the mobile app development lifecycle, from design and coding to testing and deployment.


    In today's digital world, mobile app security is more critical than ever. Enhance your skills and help protect mobile applications from vulnerabilities that could compromise user data and your organization's reputation. Be prepared to tackle the ever-present challenges in mobile app security with confidence.


    Enroll in this course and make a significant impact on your organization's security posture. Join us in the journey towards secure and reliable mobile applications!

    Who this course is for:

    • Mobile App Developers
    • Software Developers
    • Architects
    • Security Professionals
    • IT Professionals
    • Anyone Interested in Secure Mobile Development

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pack Of Coders - POC
    Pack Of Coders - POC
    Instructor's Courses
    Pack Of Coders provides online technology training, publishing, and consulting services.  Training is targeted at various skill levels and seeks to provide students with a better understanding of technology, software development practices, and cybersecurity topics.  Major course offerings include:Targeted training through our Rapid Skill Boost series - designed to help you hit the ground running on a new technology. Our Essential Skills series of courses quickly gets you trained on foundational  elements of a technology or tool.If you're working towards certifications, then our Exam Coaching sessions are just what you need.  These courses help you navigate the questions you might face on exam day!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 50
    • duration 2:17:58
    • Release Date 2024/01/13