Companies Home Search Profile

OWASP Top 10 Vulnerabilities

Focused View

Jared Smith

1:17:16

306 View
  • Stage1-Video1_1Why We Should Care About Web Security.mp4
    02:46
  • Stage1-Video2What is OWASP .mp4
    01:23
  • Stage1-Video3What is the OWASP Top 10, and Why Trust It .mp4
    02:17
  • Stage2-Video1_1Injection.mp4
    10:55
  • Stage2-Video2XSS How It Works.mp4
    04:31
  • Stage2-Video3XSS Demonstration and Prevention.mp4
    05:36
  • Stage2-Video4CSRF.mp4
    07:44
  • Stage3-Video1Broken Authentication and Session Management.mp4
    09:53
  • Stage3-Video2Broken Access Controls.mp4
    08:03
  • Stage3-Video3Sensitive Data Exposure.mp4
    09:00
  • Stage4-Video1Misconfiguration.mp4
    05:47
  • Stage4-Video2Insecure Components.mp4
    04:41
  • Stage4-Video3Insufficient Logging and Monitoring.mp4
    02:36
  • Stage4-Video4Next Steps.mp4
    02:04
  • Description


    About this Course

    Welcome again to the realm of web security, where millions of dollars and people’s lives are on the line. Not every web application has that much on the line, but many do, and it’s your job as the developer or manager to keep your users safe! From protecting static web sites to the most complex of web services and APIs, every web developer should be aware of, and adept at writing secure code and building systems that can stand up to the strongest of malicious users.

    In this course, we will build on earlier courses in basic web security by diving into the OWASP Top 10 for Node.js and JavaScript. The OWASP Top 10 is a trusted knowledge framework covering the top 10 major web security vulnerabilities, as well as providing information on how to mitigate them. Throughout this course, we will explore each vulnerability in general and in the scope of how they occur in JavaScript (as the frontend) and Node.js (as the backend).

    What you'll learn

    • Injection
    • Broken Authentication
    • XSS
    • CSRF
    • Broken Access Controls
    • Sensitive Data Exposure
    • Insecure Direct Object References
    • Misconfiguration
    • Insecure Components
    • Redirects

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display

    Jared is a Computer Security researcher at the US's largest national laboratory in Oak Ridge, TN, where he works on projects ranging from novel security data analytics tools to malware research. He was previously a software security engineer at Cisco System's internal security team and serves as a technical advisor for several Knoxville, TN companies. He roams the so-called "Cyberspace" as @jaredthecoder.

    Treehouse or is an online technology school that offers beginner to advanced courses in web design, web development, mobile development and game development. Its courses are aimed at beginners looking to learn computer coding skills for a career in the tech industry.
    • language english
    • Training sessions 14
    • duration 1:17:16
    • English subtitles has
    • Release Date 2023/04/08

    Courses related to Software Development

    Courses related to Cyber Security

    Subtitle
    CompTIA Security+ SY0-601 - Implementation
    Subtitle
    Persistence with pwncat
    Pluralsight Ricardo Reimao
    Ricardo Reimao
    Persistence with pwncat
    15:33
    English subtitles
    02/25/2023
    Subtitle
    NIST Cyber Security Framework
    Udemy Michael Goedeker
    Michael Goedeker
    NIST Cyber Security Framework
    2:58:29
    English subtitles
    11/19/2022

    Courses related to Network Security

    Courses related to Information Security