OWASP: Top 10 Items A9, A8, & A7

OWASP    |    Intermediate
  • 11 videos | 37m 51s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 84 users Rating 4.7 of 84 users (84)
In this 11-video course, learners will discover security aspects focusing on OWASP Top 10 2017 Item A9: Using Components with Known Vulnerabilities; Item A8: Insecure Deserialization; and Item A7: Cross-Site Scripting (XSS). Key concepts covered in this course include details about OWASP Top 10 2017 Item A9, dealing with known vulnerabilities, and examining different types of common vulnerabilities; and details about OWASP Top 10 2017 Item A8, which involves insecure deserialization and transmission of objects between network hosts programmatically, or storage of an object in a file, such as storing something in a web browser cookie. Next, learn how insecure deserialization can be mitigated by treating it as user input; learn how to secure traffic by encrypting it with IPSec to protect serialized data; and learn details about OWASP Top 10 2017 Item A7 relating to XSS and how XSS can be mitigated. Finally, you will learn to perform a fuzz test by using OWASP ZAP; and how to identify insecure components, serialization, and XSS.

WHAT YOU WILL LEARN

  • Describe owasp top 10 2017 item a9 dealing with known vulnerabilities
    Review different types of vulnerabilities
    Purchase merchandise at an unauthorized discount
    Describe owasp top 10 2017 item a8 which involves insecure deserialization
    Recognize how insecure deserialization can be mitigated by treating it as user input
  • Secure traffic by encrypting it with ipsec to protect serialized data
    Describe owasp top 10 2017 item a7 relating to cross-site scripting (xss)
    Recognize how cross-site scripting can be mitigated
    Perform a fuzz test using owasp zap
    Identify insecure components, serialization, and xss

IN THIS COURSE

  • 1m 42s
  • 4m 20s
    After completing this video, you will be able to describe OWASP Top 10 2017 item A9, which deals with known vulnerabilities. FREE ACCESS
  • Locked
    3.  Mitigating Known Component Vulnerabilities
    3m 45s
    Learn how to review different types of vulnerabilities. FREE ACCESS
  • Locked
    4.  Protecting Sensitive Data at Rest
    2m 19s
    In this video, find out how to purchase merchandise at a discount without authorization. FREE ACCESS
  • Locked
    5.  A8 - Insecure Deserialization
    3m 19s
    After completing this video, you will be able to describe OWASP Top 10 2017 item A8, which involves insecure deserialization. FREE ACCESS
  • Locked
    6.  Mitigating Insecure Deserialization
    2m 49s
    Upon completion of this video, you will be able to recognize how insecure deserialization can be mitigated by treating it as user input. FREE ACCESS
  • Locked
    7.  IPSec Encapsulating Security Payload
    4m 24s
    In this video, you will secure traffic by encrypting it with IPSec to protect data that has been turned into a series of numbers. FREE ACCESS
  • Locked
    8.  A7 - Cross-Site Scripting (XSS)
    4m 21s
    Upon completion of this video, you will be able to describe OWASP Top 10 2017 item A7, which relates to cross-site scripting (XSS). FREE ACCESS
  • Locked
    9.  Mitigating Cross-Site Scripting
    3m 36s
    Upon completion of this video, you will be able to recognize how to mitigate cross-site scripting. FREE ACCESS
  • Locked
    10.  Mitigating Injections
    4m 39s
    In this video, you will learn how to perform a fuzz test using the OWASP ZAP tool. FREE ACCESS
  • Locked
    11.  Exercise: Harden Web App Components and Inputs
    2m 37s
    In this video, you will identify insecure components, serialization, and cross-site scripting. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 344 users Rating 4.6 of 344 users (344)
Rating 4.6 of 396 users Rating 4.6 of 396 users (396)
Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 473 users Rating 4.5 of 473 users (473)
Rating 4.6 of 119 users Rating 4.6 of 119 users (119)
Rating 4.5 of 237 users Rating 4.5 of 237 users (237)