Secure Coding Based On Owasp Top 10 With Practical Examples
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 808.73 MB | Duration: 1h 47m
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 808.73 MB | Duration: 1h 47m
Secure Coding Guide based on OWASP Top 10 with Python, Java and .NET examples.
What you'll learn
Learn how to avoid insecure coding.
Learn OWASP Top 10 vulnerabilities.
Learn Insecure coding risks.
Learn how to mitigate cyber security risks on code level.
Learn secure functions and algorithms to use while developing critical applications.
Requirements
Software Development Experience
Cyber Security Experience
Description
Unlock the secrets to writing secure code with our in-depth course on secure coding practices! Designed for developers, security professionals, and anyone interested in safeguarding applications, this course covers the OWASP Top 10 vulnerabilities and provides practical solutions to prevent them.What You'll Learn:Detailed Explanations of OWASP Top 10 Vulnerabilities: Understand each vulnerability in detail, including examples and the potential risks they pose.Insecure vs. Secure Code Examples: See firsthand how common coding mistakes lead to vulnerabilities and learn best practices for writing secure code in .NET, Java, and Python.Prevention Techniques: Discover actionable techniques to prevent vulnerabilities, with step-by-step guidance on implementing secure coding practices.Practical Insights: Gain practical insights and real-world applications to strengthen your code and protect your applications from potential threats.Why This Course?Hands-On Learning: Engage with practical examples and coding exercises to reinforce your understanding.Expert Instruction: Learn from a seasoned expert with extensive experience in offensive security and application security.Comprehensive Coverage: Get a thorough overview of the OWASP Top 10 and how to address each issue across different programming languages.Whether you're a developer aiming to enhance your skills or a security professional seeking to start secure code review tasks , this course will equip you with the knowledge and tools to write secure, robust code. Enroll now to start your journey toward becoming a secure coding expert!
Overview
Section 1: Giriş
Lecture 1 Introduction
Section 2: Secure Coding - A01:2021 Broken Access Control
Lecture 2 Broken Access Control Explained
Lecture 3 Broken Access Control - Practical Example on a Vulnerable Web Application
Lecture 4 Vulnerable Code vs Secure Code - Example 1 (Broken Access Control)
Lecture 5 Vulnerable Code vs Secure Code - Example 2 (IDOR)
Lecture 6 Vulnerable Code vs Secure Code - Example (Rate Limiting)
Lecture 7 Broken Access Controls Prevention Guide
Section 3: Secure Coding - A02:2021 Cryptographic Failures
Lecture 8 Cryptographic Failures Explained
Lecture 9 Vulnerable Code vs Secure Code - Example 1 (Encryption, Weak Cipher Usage)
Lecture 10 Vulnerable Code vs Secure Code - Example 2 (Hard Coded Keys, Strong/Weak Keys)
Lecture 11 Vulnerable Code vs Secure Code - Example 3 (Secure Hashing Algorithms)
Lecture 12 Cryptographic Failures Prevention Guide
Section 4: Secure Coding - A03:2021 Injections
Lecture 13 Injections Explained
Lecture 14 Vulnerable Code vs Secure Code Example 1 (SQL Injection)
Lecture 15 Vulnerable Code vs Secure Code Example 2 (Command Injection)
Lecture 16 Vulnerable Code vs Secure Code Example 3 (XML Injection, File Upload, LDAP Inj.)
Lecture 17 Injection Prevention Guide
Section 5: Secure Coding - A04:2021 Insecure Design
Lecture 18 Insecure Design Explained (Design Principles, Frameworks, Key Practices)
Section 6: Secure Coding - A05:2021 Security Misconfiguration
Lecture 19 Security Misconfigurations (Security Hardenings, Error Handlings, Secure Config)
Section 7: Secure Coding - A06:2021 Vulnerable and Outdated Components
Lecture 20 Vulnerable and Outdated Components All In One
Section 8: Secure Coding - A07:2021 Identification and Authentication Failures
Lecture 21 Identification and Authentication Failures Explained
Lecture 22 Ident. and Auth. Failures Example 1 (Login Brute Force, Sensitive Data in GET )
Lecture 23 Identification and Authentication Failures Example 2
Lecture 24 Identification and Authentication Failures Prevention Guide
Section 9: Secure Coding - A08:2021 Software and Data Integrity Failures
Lecture 25 Software and Data Integrity Failures
Section 10: Secure Coding - A09:2021 Security Logging and Monitoring Failures
Lecture 26 Security Logging and Monitoring Failures Explained
Section 11: Secure Coding - A10:2021 Server-Side Request Forgery
Lecture 27 Server-Side Request Forgery All in One
Section 12: Coding Exercises
Section 13: Practice Exam
Software Developers,Application Security Practitioner,Cyber Security Professional