Course Outline
Introduction
OWASP Top Ten
-
A01 Broken Access Control
-
A02 Cryptographic Failures
-
A03 Injection
-
A04 Insecure Design
-
A05 Security Misconfiguration
-
A06 Vulnerable and Outdated Components
-
A07 Identification and Authentication Failures
-
A08 Software and Data Integrity Failures
-
A09 Security Logging and Monitoring Failures
-
A10 Server Side Request Forgery (SSRF)
Summary and Next Steps
Requirements
- A general understanding of web development lifecycle
- Experience in web application development and security
Audience
- Web developers
- Leaders
Testimonials
he's very impressive because he know everything about the topic
Marco Julio Huelva, The Wizards@Worx Holdings Inc.
Trainer was excellent, obviously well versed in the subject matter. Real world examples given.
Alan King - Jackie Ryan, Waterford Chamber Skillnet
The subject matter is very interesting and the trainer had a vast range of knowledge on everything that was included in the course.
Damien McDonnell - Jackie Ryan, Waterford Chamber Skillnet
The usage of DaDesktop with the virtual environment was very nice to use for the exercises.
Jackie Ryan, Waterford Chamber Skillnet
Deep technical knowledge
Jackie Ryan, Waterford Chamber Skillnet
Learning more about Burp Suite, I had used this app in a very basic way and I really enjoyed and benefited from taking a deeper dive
James Richardson - Jackie Ryan, Waterford Chamber Skillnet
The discussion is very clear.
ONEASTON, INC.
Learning new things about security and the exercises
ONEASTON, INC.
Additional knowledge Agenda is followed and all topics are tackled
ONEASTON, INC.
Piotr knowledge and execution of the training day relative to the time frame we had
genU
Exposure to the most important potential security issues in web applications.