Company: Pluralsight Author: Troy Hunt Full Title: Web Security And The OWASP Top 10: The Big Picture Year: 2014 Language: English Genre: Educational: Security Skill Level: Intermediate Price: - - Files: MP4 Time: 02:03:27 Video: AVC, 1024 x 768 (1.333) at 15.000 fps, 200 kbps Audio: AAC at 128 Kbps, 2 channels, 44.1 KHz OWASP Top 10 "The Big Picture" is all about understanding the top 10 web security risks we face on the web today in an easily consumable, well-structured fashion that aligns to the number one industry standard on the topic today. Security on the web is becoming an increasingly important topic for organisations to grasp. Recent years have seen the emergence of the hacktivist movement, the increasing sophistication of online career criminals and now the very real threat posed by nation states compromising personal and corporate security. The Open Web Application Security Project gives us the OWASP Top 10 to help guide the secure development of online applications and defend against these threats. This course takes you through a very well-structured, evidence-based prioritisation of risks and most importantly, how organisations building software for the web can protect against them. Lessons: 1. Introduction 01. Introduction 2. Injection 02. Overview 03. Mounting an Attack 04. Defences 05. The risk in Practice 3. Broken Authentication and Session Management 06. Overview 07. Mounting an Attack 08. Defences 09. The risk in Practice 4. Cross-Site Scripting (XSS) 10. Overview 11. Mounting an Attack 12. Defences 13. The risk in Practice 5. Insecure Direct Object References 14. Overview 15. Mounting an Attack 16. Defences 17. The risk in Practice 6. Security Misconfiguration 18. Overview 19. Mounting an Attack 20. Defences 21. The risk in Practice 7. Sensitive Data Exposure 22. Overview 23. Mounting an Attack 24. Defences 25. The risk in Practice 8. Missing Function Level Access Control 26. Overview 27. Mounting an Attack 28. Defences 29. The risk in Practice 9. Cross-Site Request Forgery (CSRF) 30. Overview 31. Mounting an Attack 32. Defences 33. The risk in Practice 10. Using Components with Known Vulnerabilities 34. Overview 35. Mounting an Attack 36. Defences 37. The risk in Practice 11. Unvalidated Redirects and Forwards 38. Overview 39. Mounting an Attack 40. Defences 41. The risk in Practice Our members see more. Join us! ------------- Our members see more. Join us!