Quick guide to the OWASP Top Ten and Application Security

What you will learn

Awareness of what Application Security is and how it’s used

Some historical context on Application Security

Basic terms used in AppSec

What a Secure SDLC and DevSecOps pipeline look like

Quick view of OWASP and the OWASP Top Ten Web App vulnerabilities

Description

Every company uses software to function. Whether they are a Fortune 500 technology company or a sole proprietor landscaping company, software is integral to businesses large and small. Software provides a means to track employees, customers, inventory, and scheduling. Data moves from a myriad of systems, networks, and software providing insights to businesses looking to stay competitive. Some of that software used is built within the organization or it is purchased and integrated. What this means is that every organization, regardless of size and industry, has a software need. It enables organizations to move quickly and stay ahead of their competition.

This is where organizations need your help to secure their applications!


Get Instant Notification of New Courses on our Telegram channel.


In this quick guide to application security and the OWASP Top Ten we will cover what is in the Top Ten. We’ll cover what makes them vulnerabilities and how to protect your application from attacks using these vulnerabilities. Well talk about cryptographic failures, insecure configuration, how to maintain software integrity, what injection attacks are and more!You’ll learn about the terms and security goals that are used in an organization. You’ll learn about some of the basic ways that application security can be brought into the development lifecycle both from a traditional pipeline and from a DevSecOps perspective. I hope you enjoy this brief but key course on AppSec.

English
language

Content

Introduction

Introduction

About Application Security

AppSec Terms
About AppSec
About OWASP

OWASP Top Ten 2021

Broken Access Controls
Cryptographic Failures
Injection
Insecure Design
Security Misconfiguration
Insecure Dependencies
Insecure Authentication
Software Integrity Failures
Logging and Monitoring Failures
Server-side Request Forgery

Conclusion

Conclusion