A detailed guide to the OWASP top 10

We will also look at real-world cases and scenarios where such vulnerabilities have been exploited. We will also make use of some third-party applications to try out some of these security risks and see how they are exploited in a real cyber-attack. By the end of the course, you will be able to prot...

Full description

Bibliographic Details
Format: eBook
Language:English
Published: [Place of publication not identified] Packt Publishing 2022
Edition:[First edition]
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Description
Summary:We will also look at real-world cases and scenarios where such vulnerabilities have been exploited. We will also make use of some third-party applications to try out some of these security risks and see how they are exploited in a real cyber-attack. By the end of the course, you will be able to protect your web applications from various vulnerability attacks. What You Will Learn Understand broken access control and its prevention Understand cryptographic failures and their prevention Understand SQL injection attacks Understand cross-site scripting attacks Understand security misconfiguration and its prevention Understand server-side request forgery and its prevention Audience This course is for cybersecurity professionals and cybersecurity students who would like to stay safe from vulnerabilities on the Internet. An understanding of the basics of cyber security is required to take up the course.
About The Author Alexander Oni: Alexander Oni is a bestselling instructor with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for three years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His success in Udemy has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly travelling, spending a month in every city and moving to the next. His hobbies include watching movies, sports, and chess
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications and has become such an important cyber security resource today. Unlike other courses that take a lazy approach to describe these security risks, this course analyzes each vulnerability in sufficient detail by describing what exactly the vulnerabilities are. The OWASP top 10 vulnerabilities explained in detail are Broken Access Control, Cryptographic Failures, SQL Injection Attacks, Cross Site Scripting Attacks, Insecure Design, Security Misconfiguration, Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery. We will discuss how they are exploited by attackers and how they can be prevented.
Item Description:"Published in December 2022."
Physical Description:1 video file (2 hr., 2 min.) sound, color
ISBN:9781837630554