reklama - zainteresowany?

A Detailed Guide to the OWASP Top 10. Explore in full detail the OWASP top 10 Application Attacks and how to prevent them - Helion

A Detailed Guide to the OWASP Top 10. Explore in full detail the OWASP top 10 Application Attacks and how to prevent them
video
Autor: Alexander Oni
Tytuł oryginału: A Detailed Guide to the OWASP Top 10. Explore in full detail the OWASP top 10 Application Attacks and how to prevent them
ISBN: 9781837630554
Format: video
Data wydania: 2022-12-23
Księgarnia: Helion

Cena książki: 459,00 zł

Dodaj do koszyka A Detailed Guide to the OWASP Top 10. Explore in full detail the OWASP top 10 Application Attacks and how to prevent them

The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications and has become such an important cyber security resource today.



Unlike other courses that take a lazy approach to describe these security risks, this course analyzes each vulnerability in sufficient detail by describing what exactly the vulnerabilities are. The OWASP top 10 vulnerabilities explained in detail are Broken Access Control, Cryptographic Failures, SQL Injection Attacks, Cross Site Scripting Attacks, Insecure Design, Security Misconfiguration, Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery. We will discuss how they are exploited by attackers and how they can be prevented. We will also look at real-world cases and scenarios where such vulnerabilities have been exploited.



We will also make use of some third-party applications to try out some of these security risks and see how they are exploited in a real cyber-attack. By the end of the course, you will be able to protect your web applications from various vulnerability attacks.



All resources are placed here: https://github.com/PacktPublishing/A-Detailed-Guide-to-the-OWASP-Top-10

Dodaj do koszyka A Detailed Guide to the OWASP Top 10. Explore in full detail the OWASP top 10 Application Attacks and how to prevent them

 

Osoby które kupowały "A Detailed Guide to the OWASP Top 10. Explore in full detail the OWASP top 10 Application Attacks and how to prevent them", wybierały także:

  • Windows Media Center. Domowe centrum rozrywki
  • Ruby on Rails. Ćwiczenia
  • DevOps w praktyce. Kurs video. Jenkins, Ansible, Terraform i Docker
  • Przywództwo w Å›wiecie VUCA. Jak być skutecznym liderem w niepewnym Å›rodowisku
  • Scrum. O zwinnym zarzÄ…dzaniu projektami. Wydanie II rozszerzone

Dodaj do koszyka A Detailed Guide to the OWASP Top 10. Explore in full detail the OWASP top 10 Application Attacks and how to prevent them

Spis treści

[ERROR]

Dodaj do koszyka A Detailed Guide to the OWASP Top 10. Explore in full detail the OWASP top 10 Application Attacks and how to prevent them

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.