OWASP Top 10: A06:2021-Vulnerable & Outdated Components
OWASP
| Intermediate
- 8 videos | 40m 39s
- Includes Assessment
- Earns a Badge
Software developers often use existing third-party APIs and software components. This reduces development time and the time to market for software products. In this course, learn about trusted APIs and components, including when they are used, how developers must truly understand how these items work, and how they must be kept up to date. Next, examine the Heartbleed Bug and how to view components in Microsoft Visual Studio. Finally, discover how security must apply to all aspects of continuous integration and continuous delivery (CI/CD) and learn how to search the Shodan website for vulnerable devices and apps. Upon completion, you'll be able to recognize the importance of using only trusted third-party APIs and software components during application development.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify how software developers commonly use third-party apis and componentsSearch and understand the common vulnerabilities and exposures (cve) databaseRecall how the heartbleed bug compromises older versions of openssl
-
Recognize how security must be integrated into all aspects of continuous integration and continuous delivery (ci/cd)Secure a back-end databaseBrowse vulnerable devices using the shodan websiteSummarize the key concepts covered in this course
IN THIS COURSE
-
46s
-
6m 29s
-
5m 36s
-
5m 29s
-
6m 51s
-
9m 5s
-
5m 29s
-
53s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.