OWASP Top 10: A04:2021-Insecure Design
OWASP
| Intermediate
- 8 videos | 38m 22s
- Includes Assessment
- Earns a Badge
Today's web applications combine software code and resultant data, with the trustworthiness of both resulting in a secure trusted application. There are many planning strategies and tools that can ensure software and data integrity. In this course, explore IT supply chain security, how to deploy Linux updates, and how to configure a Windows Server Update Services (WSUS) host. Next, examine object-oriented programming (OOP) and how it is related to insecure deserialization attacks. Finally, learn how to use the OWASP Dependency-Check tool to verify that publicly disclosed vulnerabilities are not present in a project's dependencies. Upon completion, you'll be able to ensure that the design of a web application includes business requirements and related security controls.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline how confidentiality, integrity, and availability (cia) apply to web app developmentState how security applies to each phase of the software development life cycle (sdlc)Identify detailed security controls listed in the cloud controls matrix (ccm)
-
Name various types of software testingConfigure web application deployment slots in the microsoft azure cloudList the benefits of using a secure api when writing web app codeSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 6s
-
6m 42s
-
8m 6s
-
4m 32s
-
5m 53s
-
5m 51s
-
5m 24s
-
50s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.