PLU | Web Security And The OWASP Top 10: The Big Picture (2014 EN)

Discussion in 'Information Technology' started by Kanka, Jul 28, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Troy Hunt
    Full Title: Web Security And The OWASP Top 10: The Big Picture
    Year: 2014
    Language: English
    Genre: Educational: Security
    Skill Level: Intermediate
    Price: -
    -
    Files: MP4
    Time: 02:03:27
    Video: AVC, 1024 x 768 (1.333) at 15.000 fps, 200 kbps
    Audio: AAC at 128 Kbps, 2 channels, 44.1 KHz



    OWASP Top 10 "The Big Picture" is all about understanding the top 10 web security risks we face on the web today in an easily consumable, well-structured fashion that aligns to the number one industry standard on the topic today.

    Security on the web is becoming an increasingly important topic for organisations to grasp. Recent years have seen the emergence of the hacktivist movement, the increasing sophistication of online career criminals and now the very real threat posed by nation states compromising personal and corporate security. The Open Web Application Security Project gives us the OWASP Top 10 to help guide the secure development of online applications and defend against these threats. This course takes you through a very well-structured, evidence-based prioritisation of risks and most importantly, how organisations building software for the web can protect against them.


    Lessons:
    1. Introduction
    01. Introduction
    2. Injection
    02. Overview
    03. Mounting an Attack
    04. Defences
    05. The risk in Practice
    3. Broken Authentication and Session Management
    06. Overview
    07. Mounting an Attack
    08. Defences
    09. The risk in Practice
    4. Cross-Site Scripting (XSS)
    10. Overview
    11. Mounting an Attack
    12. Defences
    13. The risk in Practice
    5. Insecure Direct Object References
    14. Overview
    15. Mounting an Attack
    16. Defences
    17. The risk in Practice
    6. Security Misconfiguration
    18. Overview
    19. Mounting an Attack
    20. Defences
    21. The risk in Practice
    7. Sensitive Data Exposure
    22. Overview
    23. Mounting an Attack
    24. Defences
    25. The risk in Practice
    8. Missing Function Level Access Control
    26. Overview
    27. Mounting an Attack
    28. Defences
    29. The risk in Practice
    9. Cross-Site Request Forgery (CSRF)
    30. Overview
    31. Mounting an Attack
    32. Defences
    33. The risk in Practice
    10. Using Components with Known Vulnerabilities
    34. Overview
    35. Mounting an Attack
    36. Defences
    37. The risk in Practice
    11. Unvalidated Redirects and Forwards
    38. Overview
    39. Mounting an Attack
    40. Defences
    41. The risk in Practice


    -------------
     
    BlackCat likes this.
  2. BlackCat

    BlackCat Well-Known Member Loyal User

    Messages:
    7,213
    Likes Received:
    900
    Trophy Points:
    113
    thnx