title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.
Understanding Vulnerabilities and Security Threats (WSKF603)
Course Description
Overview
Build better software and strengthen your IT career opportunities by hardening your security mindset. Break down the OWASP® Top 10 to understand the most common pitfalls and use hands-on labs to learn techniques to battle each vulnerability.Key Benefits for You:
- Live, instructor-led hands-on labs
- Harden your cybersecurity skill set
- Practice using your preferred development language
This course prepares participants to ensure the security of their web applications by understanding and implementing effective mitigations for the most common vulnerabilities identified by the OWASP® Top 10.
Objectives
Audience
Prerequisites
-
Participants should have a basic understanding of web development principles and familiarity with the chosen development language. They will need a computing system with adequate performance specifications and access to the provided demo environments.
Topics
- Welcome and Introduction
- Importance of Web Application Security
- Overview of the OWASP® Top 10 (2021)
- Case studies of major security breaches
- Broken Access Control (A01:2021)
- Understanding Broken Access Control
- Exploiting Broken Access Control
- Defending Against Broken Access Control
- Injection (A03:2021)
- Understanding Injection
- Exploiting Injection
- Defending Against Injection
- Insecure Design (A04:2021)
- Understanding Insecure Design
- Identifying Insecure Design
- Mitigating Insecure Design
- Security Misconfiguration (A05:2021)
- Understanding Security Misconfiguration
- Exploiting Security Misconfiguration
- Defending Against Security Misconfiguration
- Vulnerable and Outdated Components (A06:2021)
- Understanding Vulnerable and Outdated Components
- Identifying Vulnerable Components
- Mitigating Risks of Vulnerable Components
- Identification and Authentication Failures (A07:2021)
- Understanding Identification and Authentication Failures
- Exploiting Identification and Authentication Failures
- Defending Against Identification and Authentication Failures
- Software and Data Integrity Failures (A08:2021)
- Understanding Software and Data Integrity Failures
- Identifying Integrity Failures
- Defending Against Integrity Failures
- Security Logging and Monitoring Failures (A09:2021)
- Understanding Security Logging and Monitoring Failures
- Identifying Logging and Monitoring Failures
- Defending Against Logging and Monitoring Failures
- Server-Side Request Forgery (A10:2021)
- Understanding Server-Side Request Forgery
- Exploiting Server-Side Request Forgery
- Defending Against Server-Side Request Forgery
- Common Developer Mistakes for Each Risk
- Best Practices for Secure Development
- Techniques to Battle Vulnerabilities
- Tools for Security Testing and Defense
Related Courses
-
RHEL SELinux Policy Administration
OSUN-429- Duration: 3 Days
- Delivery Format: Classroom Training, Online Training
- Price: 1,755.00 USD
-
Microsoft Security Operations Analyst
MOC-SC-200T00- Duration: 4 Days
- Delivery Format: Classroom Training, Online Training
- Price: 2,380.00 USD
Self-Paced Training Info
Learn at your own pace with anytime, anywhere training
- Same in-demand topics as instructor-led public and private classes.
- Standalone learning or supplemental reinforcement.
- e-Learning content varies by course and technology.
- View the Self-Paced version of this outline and what is included in the SPVC course.
- Learn more about e-Learning
Course Added To Shopping Cart
bla
bla
bla
bla
bla
bla
Self-Paced Training Terms & Conditions
Exam Terms & Conditions
Sorry, there are no classes that meet your criteria.
Please contact us to schedule a class.
STOP! Before You Leave
Save 0% on this course!
Take advantage of our online-only offer & save 0% on any course !
Promo Code skip0 will be applied to your registration
Purchase Information
title
Please take a moment to fill out this form. We will get back to you as soon as possible.
All fields marked with an asterisk (*) are mandatory.