Tags
Language
Tags
March 2025
Su Mo Tu We Th Fr Sa
23 24 25 26 27 28 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 31 1 2 3 4 5
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Secure Coding Based On Owasp Top 10 With Practical Examples

Posted By: ELK1nG
Secure Coding Based On Owasp Top 10 With Practical Examples

Secure Coding Based On Owasp Top 10 With Practical Examples
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 808.73 MB | Duration: 1h 47m

Secure Coding Guide based on OWASP Top 10 with Python, Java and .NET examples.

What you'll learn

Learn how to avoid insecure coding.

Learn OWASP Top 10 vulnerabilities.

Learn Insecure coding risks.

Learn how to mitigate cyber security risks on code level.

Learn secure functions and algorithms to use while developing critical applications.

Requirements

Software Development Experience

Cyber Security Experience

Description

Unlock the secrets to writing secure code with our in-depth course on secure coding practices! Designed for developers, security professionals, and anyone interested in safeguarding applications, this course covers the OWASP Top 10 vulnerabilities and provides practical solutions to prevent them.What You'll Learn:Detailed Explanations of OWASP Top 10 Vulnerabilities: Understand each vulnerability in detail, including examples and the potential risks they pose.Insecure vs. Secure Code Examples: See firsthand how common coding mistakes lead to vulnerabilities and learn best practices for writing secure code in .NET, Java, and Python.Prevention Techniques: Discover actionable techniques to prevent vulnerabilities, with step-by-step guidance on implementing secure coding practices.Practical Insights: Gain practical insights and real-world applications to strengthen your code and protect your applications from potential threats.Why This Course?Hands-On Learning: Engage with practical examples and coding exercises to reinforce your understanding.Expert Instruction: Learn from a seasoned expert with extensive experience in offensive security and application security.Comprehensive Coverage: Get a thorough overview of the OWASP Top 10 and how to address each issue across different programming languages.Whether you're a developer aiming to enhance your skills or a security professional seeking to start secure code review tasks , this course will equip you with the knowledge and tools to write secure, robust code. Enroll now to start your journey toward becoming a secure coding expert!

Overview

Section 1: Giriş

Lecture 1 Introduction

Section 2: Secure Coding - A01:2021 Broken Access Control

Lecture 2 Broken Access Control Explained

Lecture 3 Broken Access Control - Practical Example on a Vulnerable Web Application

Lecture 4 Vulnerable Code vs Secure Code - Example 1 (Broken Access Control)

Lecture 5 Vulnerable Code vs Secure Code - Example 2 (IDOR)

Lecture 6 Vulnerable Code vs Secure Code - Example (Rate Limiting)

Lecture 7 Broken Access Controls Prevention Guide

Section 3: Secure Coding - A02:2021 Cryptographic Failures

Lecture 8 Cryptographic Failures Explained

Lecture 9 Vulnerable Code vs Secure Code - Example 1 (Encryption, Weak Cipher Usage)

Lecture 10 Vulnerable Code vs Secure Code - Example 2 (Hard Coded Keys, Strong/Weak Keys)

Lecture 11 Vulnerable Code vs Secure Code - Example 3 (Secure Hashing Algorithms)

Lecture 12 Cryptographic Failures Prevention Guide

Section 4: Secure Coding - A03:2021 Injections

Lecture 13 Injections Explained

Lecture 14 Vulnerable Code vs Secure Code Example 1 (SQL Injection)

Lecture 15 Vulnerable Code vs Secure Code Example 2 (Command Injection)

Lecture 16 Vulnerable Code vs Secure Code Example 3 (XML Injection, File Upload, LDAP Inj.)

Lecture 17 Injection Prevention Guide

Section 5: Secure Coding - A04:2021 Insecure Design

Lecture 18 Insecure Design Explained (Design Principles, Frameworks, Key Practices)

Section 6: Secure Coding - A05:2021 Security Misconfiguration

Lecture 19 Security Misconfigurations (Security Hardenings, Error Handlings, Secure Config)

Section 7: Secure Coding - A06:2021 Vulnerable and Outdated Components

Lecture 20 Vulnerable and Outdated Components All In One

Section 8: Secure Coding - A07:2021 Identification and Authentication Failures

Lecture 21 Identification and Authentication Failures Explained

Lecture 22 Ident. and Auth. Failures Example 1 (Login Brute Force, Sensitive Data in GET )

Lecture 23 Identification and Authentication Failures Example 2

Lecture 24 Identification and Authentication Failures Prevention Guide

Section 9: Secure Coding - A08:2021 Software and Data Integrity Failures

Lecture 25 Software and Data Integrity Failures

Section 10: Secure Coding - A09:2021 Security Logging and Monitoring Failures

Lecture 26 Security Logging and Monitoring Failures Explained

Section 11: Secure Coding - A10:2021 Server-Side Request Forgery

Lecture 27 Server-Side Request Forgery All in One

Section 12: Coding Exercises

Section 13: Practice Exam

Software Developers,Application Security Practitioner,Cyber Security Professional