Quick guide to the OWASP Top Ten and Application Security
What you will learn
Awareness of what Application Security is and how it’s used
Some historical context on Application Security
Basic terms used in AppSec
What a Secure SDLC and DevSecOps pipeline look like
Quick view of OWASP and the OWASP Top Ten Web App vulnerabilities
Description
Every company uses software to function. Whether they are a Fortune 500 technology company or a sole proprietor landscaping company, software is integral to businesses large and small. Software provides a means to track employees, customers, inventory, and scheduling. Data moves from a myriad of systems, networks, and software providing insights to businesses looking to stay competitive. Some of that software used is built within the organization or it is purchased and integrated. What this means is that every organization, regardless of size and industry, has a software need. It enables organizations to move quickly and stay ahead of their competition.
This is where organizations need your help to secure their applications!
In this quick guide to application security and the OWASP Top Ten we will cover what is in the Top Ten. Weβll cover what makes them vulnerabilities and how to protect your application from attacks using these vulnerabilities. Well talk about cryptographic failures, insecure configuration, how to maintain software integrity, what injection attacks are and more!Youβll learn about the terms and security goals that are used in an organization. Youβll learn about some of the basic ways that application security can be brought into the development lifecycle both from a traditional pipeline and from a DevSecOps perspective. I hope you enjoy this brief but key course on AppSec.
Content