OWASP: Top 10 Items A9, A8, & A7
OWASP
| Intermediate
- 11 videos | 37m 51s
- Includes Assessment
- Earns a Badge
In this 11-video course, learners will discover security aspects focusing on OWASP Top 10 2017 Item A9: Using Components with Known Vulnerabilities; Item A8: Insecure Deserialization; and Item A7: Cross-Site Scripting (XSS). Key concepts covered in this course include details about OWASP Top 10 2017 Item A9, dealing with known vulnerabilities, and examining different types of common vulnerabilities; and details about OWASP Top 10 2017 Item A8, which involves insecure deserialization and transmission of objects between network hosts programmatically, or storage of an object in a file, such as storing something in a web browser cookie. Next, learn how insecure deserialization can be mitigated by treating it as user input; learn how to secure traffic by encrypting it with IPSec to protect serialized data; and learn details about OWASP Top 10 2017 Item A7 relating to XSS and how XSS can be mitigated. Finally, you will learn to perform a fuzz test by using OWASP ZAP; and how to identify insecure components, serialization, and XSS.
WHAT YOU WILL LEARN
-
Describe owasp top 10 2017 item a9 dealing with known vulnerabilitiesReview different types of vulnerabilitiesPurchase merchandise at an unauthorized discountDescribe owasp top 10 2017 item a8 which involves insecure deserializationRecognize how insecure deserialization can be mitigated by treating it as user input
-
Secure traffic by encrypting it with ipsec to protect serialized dataDescribe owasp top 10 2017 item a7 relating to cross-site scripting (xss)Recognize how cross-site scripting can be mitigatedPerform a fuzz test using owasp zapIdentify insecure components, serialization, and xss
IN THIS COURSE
-
1m 42s
-
4m 20sAfter completing this video, you will be able to describe OWASP Top 10 2017 item A9, which deals with known vulnerabilities. FREE ACCESS
-
3m 45sLearn how to review different types of vulnerabilities. FREE ACCESS
-
2m 19sIn this video, find out how to purchase merchandise at a discount without authorization. FREE ACCESS
-
3m 19sAfter completing this video, you will be able to describe OWASP Top 10 2017 item A8, which involves insecure deserialization. FREE ACCESS
-
2m 49sUpon completion of this video, you will be able to recognize how insecure deserialization can be mitigated by treating it as user input. FREE ACCESS
-
4m 24sIn this video, you will secure traffic by encrypting it with IPSec to protect data that has been turned into a series of numbers. FREE ACCESS
-
4m 21sUpon completion of this video, you will be able to describe OWASP Top 10 2017 item A7, which relates to cross-site scripting (XSS). FREE ACCESS
-
3m 36sUpon completion of this video, you will be able to recognize how to mitigate cross-site scripting. FREE ACCESS
-
4m 39sIn this video, you will learn how to perform a fuzz test using the OWASP ZAP tool. FREE ACCESS
-
2m 37sIn this video, you will identify insecure components, serialization, and cross-site scripting. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.