OWASP Top 10: A9 - Using Components with Known Vulnerabilities

OWASP    |    Intermediate
  • 6 videos | 30m 44s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 69 users Rating 4.6 of 69 users (69)
Software developers often use existing third-party APIs and software components instead of recreating the wheel, so to speak. This reduces development time and time to market for software products. In this course, you'll learn that only trusted APIs and components should be used, that developers must truly understand how these items work, and that they must be kept up-to-date. Next, you'll learn about the Heartbleed Bug and how to view components in Microsoft Visual Studio. You'll then examine how security must apply to all aspects of Continuous Integration and Continuous Delivery. Lastly, you'll explore how to search the shodan.io web site for vulnerable devices and apps.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify how software developers commonly use third-party apis and components
    Describe how the heartbleed bug compromises older versions of openssl
  • Recognize how security must be integrated into all aspects of continuous integration and continuous delivery (ci/cd)
    Browse vulnerable devices on the shodan.io web site
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 36s
  • 6m 21s
  • Locked
    3.  Buffer Overflows
    6m 54s
  • Locked
    4.  Continuous Integration and Continuous Delivery Pipelines
    8m 2s
  • Locked
    5.  Viewing Vulnerable Devices Using Shodan.io
    6m 52s
  • Locked
    6.  Course Summary
    1m

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 50 users Rating 4.5 of 50 users (50)
Rating 4.6 of 239 users Rating 4.6 of 239 users (239)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 29 users Rating 4.8 of 29 users (29)
Rating 4.5 of 119 users Rating 4.5 of 119 users (119)
Rating 4.5 of 60 users Rating 4.5 of 60 users (60)