![]() |
Owasp Api Security Top 10 (2021) With Java Examples - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Owasp Api Security Top 10 (2021) With Java Examples (/Thread-Owasp-Api-Security-Top-10-2021-With-Java-Examples) |
Owasp Api Security Top 10 (2021) With Java Examples - AD-TEAM - 09-27-2024 ![]() Owasp Api Security Top 10 2021 With Java Examples Last updated 10/2022 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 3.03 GB | Duration: 7h 23m Learn OWASP Top 10 2021 & OWASP Top 10 2017, Understand the most critical Security Vulnerabilities in Web Applications
[b]What you'll learn[/b] OWASP Top 10 2021 OWASP Top 10 2017 OWASP API Security Guidelines Practical tips and trics Real-life examples of vulnerabilities and prevention of vulnerabilities Secure Coding Practices with Java Examples How to produce secure code for Web Application Security Guidelines and Standards The most common security threats and vulnerabilities Threat modelling How to build efficient process in your team to create Secure Design [b]Requirements[/b] Basic understanding of how Web works Knowledge of one of the programming languages for web development [b]Description[/b] From this course, you can learn OWASP Top 10 Web API Security.There are a lot of other courses on this topic. So, why would you choose exactly this course? Here are just a few reasons:- Coding examplesTo learn to program is not enough just watching videos and reading books. You also need to have a lot of practice. In this training course, you will review multiple practical tasks and coding examples which will help you learn and understand Java better.- Open source codeWe hide nothing from our students! Including the source code for the home task solutions and source code of examples that were shared during the lesson. Having the source code you can just copy and paste it to run it on your local computer to understand how things work better.You are allowed to use all source code examples for learning purposes. This helps significantly to configure the environment and make tests work, especially in case students didn't work with any testing framework in the past.- Q&A support The significant difference between the online and offline learning process is the instructor's availability. If you are in one room with a tutor he always can help you to get understand the specific concept or to help fix your code on your computer. In this course, we are supporting students with answers to any questions flagged in the Q&A section. In case there will be recurring questions - separate video lessons will be created to show how to address the issue. So with this course you are not just getting video materials, code exercises, source code, access to the free mobile application without limits (which is still pretty cool, huh? ![]() ![]() ![]() Overview Section 1: Introduction Lecture 1 Communication plan Lecture 2 Unlimited access to 'Learn IT' application for students Lecture 3 Tips to Improve Your Course Taking Experience Section 2: OWASP Top 10 Lecture 4 OWASP Top 10: Overview Section 3: A01:2021-Broken Access Control Lecture 5 Broken Access Control Section 4: A02:2021-Cryptographic Failures Lecture 6 Cryptography Failures (Theory, Sensitive Data, Data Breach, Types of Failures) Lecture 7 Cryptography Failures (Practical Examples, SQL Injections, TLS/SSL, HTTPS) Lecture 8 Cryptography Failures (Examples, Password Encryption, Hashing, Salting) Section 5: A03:2021-Injection Lecture 9 Injection (Overview, Fuzzing, CWEs, Impact, Injection Types, Command Injection) Lecture 10 Injection (Cross Site Scripting, Types of XSS, SQL, JPA, NoSQL Injections) Lecture 11 Injection (XPath Injection, Log Injection, Input Validation) Section 6: A04:2021-Insecure Design Lecture 12 Insecure Design (Overivew, CWEs, Shift Left Security, Threat Modeling Manifesto) Lecture 13 Insecure Design (Secure Design Process, Security Controls, Metrics, Examples) Section 7: A05:2021-Security Misconfiguration Lecture 14 Security Misconfiguration (Overview, CWEs, Types, Real-life attacks) Lecture 15 Security Misconfiguration (Hardening, Zero Trust, Defense in Depth, Practice) Section 8: A06:2021-Vulnerable and Outdated Components Lecture 16 Vulnerable & Outdated Components Section 9: A07:2021-Identification and Authentication Failures Lecture 17 Identification & Authentication Failures Section 10: A08:2021-Software and Data Integrity Failures Lecture 18 Software & Data Integrity Failures Section 11: A09:2021-Security Logging and Monitoring Failures Lecture 19 Security Logging & Monitoring Failures Lecture 20 Logging in Java: Part 1 (Logging theory, Logging Levels, Java Logging Framework) Lecture 21 Logging in Java: Part 2 (Log4J, Logback, SLF4J) Section 12: A10:2021-Server-Side Request Forgery Lecture 22 Server-Side Request Forgery (SSRF) Section 13: ===== EXAM TASK: OWASP Top 10, Secure Coding & Logging ===== Lecture 23 Exam Task: Description and Solution (with reference to the source code) Section 14: Bonus Section Lecture 24 Bonus Lesson Web Developers,Software Architects,Software Engineers,Quality Assurance Engineers,Project & Delivery Managers ![]() |