• Post category:StudyBullet-5
  • Reading time:5 mins read


Learn OWASP top 10 Cyber Security attacks. Use Penetration Testing as an ethical hacker to secure Web applications

What you will learn

Understand who OWASP is

What is the OWASP Top 10 List

Best Practices for each of the Top 10 items

Perform OWASP Top 10 Penetration Testing

Develop Secure Web Applications

Understand Industry Standards and Best Practices

Description

This course will give you a solid introduction to the OWASP top 10 cybersecurity risks. Apart from going through the current top 10, the course will also dive into Ethical Hacking and Penetration Testing where you will learn how to perform some of the attacks mentioned in the OWASP top 10. This to ensure that you as a security professional or Software Engineer can protect Web Applications against some of the most popular attacks. You will get an introduction to Cybersecurity strategies along with an introduction to the DVWA (Damn Vulnerable Web Application).

What is a Cybersecurity Strategy?

This section is an optional part of the course, which is still recommended to been viewed as it will give a good introduction to Cybersecurity strategies if you decide to dive deeper into Ethical hacking or Penetration testing after taking this course. The section covers:

Introduction – How to build a cyber strategy


Get Instant Notification of New Courses on our Telegram channel.


  • Understand threats and Risks

Cyber attack Strategies (Red Team)

  • External testing strategies
  • Internal testing strategies
  • Blind testing strategy
  • Target testing strategy

Cyber Defense strategies (Blue Team)

  • Defense in depth
  • Defense in breadth

Ethical Hacking | Cybersecurity | Penetration Testing | Cybersecurity For Beginners

During this course you will get an introduction to basic penetration testing via DVWA (Damn Vulnerable Web Application). In this course you will learn how to make SQL Injections, Brute Force attacks and other attacks.

English
language

Content

Introduction

Introduction
Introduction to Application Security
Introduction to Penetration Testing

Blue vs Read Team (Optional)

Blue vs Red team Strategy
Cyber attack Strategies(Red Team)
Cyber Defense strategies(Blue Team)

OWASP Top 10

What is the OWASP?
The vulnerabilities in the The OWASP Top 10
A1 – Broken Access Control
A2 – Cryptographic Failures
A3 – Injection
A4 – Insecure Design
A5 – Security Misconfiguration
A6 – Vulnerable and Outdated Components
A7 – Identification and Authentication Failures
A8 – Software and Data Integrity Failures
A9 – Security Logging and Monitoring Failures
A10 – Server-Side Request Forgery

Penetration Testing

Introduction To Virtual Machines
Introduction To DVWA
DVWA Setup
SQL Injection
SQL Injection (Medium)
Brute Force
CSRF (Cross-site request forgery)