Integrity Training – OWASP: Avoiding Hacker Tricks
The OWASP: Avoiding Hacker Tricks course is part of a series of training courses on the Open Web Application Security Project (OWASP). This course covers the fundamental concepts and techniques to avoid being hacked and to secure the environment from any kind of internal and external threats. The course also briefly discusses the types of attacks an application may face during its lifecycle.
The OWASP Foundation was established with a purpose to secure the applications in such a way that they can be conceived, developed, acquired, operated, and maintained in a trusted way. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. This course along with the other courses in the series on OWASP provides a basic overview of the concepts that form an integral part of the OWASP core values.
Course Curriculum
- Start
Topic A: Introduction – Part 1 (0:25)
- Start
Introduction – Part 2 (26:21)
- Start
Introduction – Part 3 (0:11)
- Start
Topic B: Know Your Threats – Part 1 (0:12)
- Start
Know Your Threats – Part 2 (4:52)
- Start
Know Your Threats – Part 3 (0:11)
- Start
Topic C: Cross Site Scripting – Part 1 (0:11)
- Start
Cross Site Scripting – Part 2 (12:47)
- Start
Cross Site Scripting – Part 3 (0:18)
- Start
Topic D: SQL Injection Attack – Part 1 (0:15)
- Start
SQL Injection Attack – Part 2 (17:13)
- Start
SQL Injection Attack – Part 3 (0:19)
- Start
Topic E: Insecure Object Reference – Part 1 (0:13)
- Start
Insecure Object Reference – Part 2 (15:18)
- Start
Insecure Object Reference – Part 3 (0:11)
- Start
Topic F: Integer Overflow – Part 1 (0:12)
- Start
Integer Overflow – Part 2 (4:21)
- Start
Integer Overflow – Part 3 (0:07)
Get Integrity Training – OWASP: Avoiding Hacker Tricks at tenco.pro
Reviews
There are no reviews yet.