OWASP Top 10: A08:2021-Software & Data Integrity Failures

OWASP    |    Intermediate
  • 12 videos | 1h 6m 11s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 182 users Rating 4.6 of 182 users (182)
Today's web applications combine software code and resultant data, with the trustworthiness of both resulting in a secure and trusted application. There are many planning strategies and tools that can ensure software and data integrity. In this course, learn about IT supply chain security, deploying Linux updates, and configuring a Windows Server Update Services (WSUS) host. Next, explore object-oriented programming (OOP) and how it is related to insecure deserialization attacks. Finally, practice ensuring file integrity using file hashing in Windows and Linux and using the OWASP Dependency-Check tool to verify that publicly disclosed vulnerabilities are not present in a project's dependencies. Upon completion, you'll be able to ensure the integrity of software code, dependencies, and resultant data.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how signed hardware firmware updates and software code pipelines play a role in web app security
    Deploy linux updates
    Configure and deploy a windows server update services (wsus) server
    Identify how the concept of objects, methods, and properties applies to scripting and software development
    Identify how deserialization attacks occur
  • Recognize how to deploy security controls to mitigate deserialization attacks
    Digitally sign a microsoft powershell script
    Hash files using windows commands
    Hash files using linux commands
    Verify that publicly disclosed vulnerabilities are not present within a project's dependencies
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 47s
  • 6m 44s
  • Locked
    3.  Deploying Linux Updates from Trusted Repositories
    4m 57s
  • Locked
    4.  Configuring Windows Server Update Services (WSUS)
    6m 48s
  • Locked
    5.  Object-oriented Programming (OOP)
    6m 45s
  • Locked
    6.  Insecure Deserialization Attacks
    6m 34s
  • Locked
    7.  Mitigating Insecure Deserialization Attacks
    6m
  • Locked
    8.  Digitally Signing PowerShell Scripts
    8m 29s
  • Locked
    9.  Hashing Files in Windows
    5m 28s
  • Locked
    10.  Hashing Files in Linux
    7m 22s
  • Locked
    11.  Using the OWASP Dependency-check Tool
    5m 17s
  • Locked
    12.  Course Summary
    1m 1s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 16 users Rating 4.8 of 16 users (16)
Rating 4.6 of 198 users Rating 4.6 of 198 users (198)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 344 users Rating 4.6 of 344 users (344)
Rating 4.6 of 196 users Rating 4.6 of 196 users (196)
Rating 4.6 of 179 users Rating 4.6 of 179 users (179)