OWASP: Top 10 Items A9, A8, & A7

OWASP    |    Intermediate
  • 11 Videos | 42m 21s
  • Includes Assessment
  • Earns a Badge
Likes 38 Likes 38
In this 11-video course, learners will discover security aspects focusing on OWASP Top 10 2017 Item A9: Using Components with Known Vulnerabilities; Item A8: Insecure Deserialization; and Item A7: Cross-Site Scripting (XSS). Key concepts covered in this course include details about OWASP Top 10 2017 Item A9, dealing with known vulnerabilities, and examining different types of common vulnerabilities; and details about OWASP Top 10 2017 Item A8, which involves insecure deserialization and transmission of objects between network hosts programmatically, or storage of an object in a file, such as storing something in a web browser cookie. Next, learn how insecure deserialization can be mitigated by treating it as user input; learn how to secure traffic by encrypting it with IPSec to protect serialized data; and learn details about OWASP Top 10 2017 Item A7 relating to XSS and how XSS can be mitigated. Finally, you will learn to perform a fuzz test by using OWASP ZAP; and how to identify insecure components, serialization, and XSS.

WHAT YOU WILL LEARN

  • describe OWASP Top 10 2017 item A9 dealing with known vulnerabilities
    review different types of vulnerabilities
    purchase merchandise at an unauthorized discount
    describe OWASP Top 10 2017 item A8 which involves insecure deserialization
    recognize how insecure deserialization can be mitigated by treating it as user input
  • secure traffic by encrypting it with IPSec to protect serialized data
    describe OWASP Top 10 2017 item A7 relating to cross-site scripting (XSS)
    recognize how cross-site scripting can be mitigated
    perform a fuzz test using OWASP ZAP
    identify insecure components, serialization, and XSS

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 42s
    UP NEXT
  • Playable
    2. 
    A9 - Using Components with Known Vulnerabilities
    4m 20s
  • Locked
    3. 
    Mitigating Known Component Vulnerabilities
    3m 45s
  • Locked
    4. 
    Protecting Sensitive Data at Rest
    2m 19s
  • Locked
    5. 
    A8 - Insecure Deserialization
    3m 19s
  • Locked
    6. 
    Mitigating Insecure Deserialization
    2m 49s
  • Locked
    7. 
    IPSec Encapsulating Security Payload
    4m 24s
  • Locked
    8. 
    A7 - Cross-Site Scripting (XSS)
    4m 21s
  • Locked
    9. 
    Mitigating Cross-Site Scripting
    3m 36s
  • Locked
    10. 
    Mitigating Injections
    4m 39s
  • Locked
    11. 
    Exercise: Harden Web App Components and Inputs
    2m 37s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 23 Likes 23  
Likes 19 Likes 19  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 107 Likes 107  
Likes 47 Likes 47  
Likes 29 Likes 29