OWASP: Top 10 & Web Applications
OWASP 2017
| Intermediate
- 13 videos | 1h 26s
- Includes Assessment
- Earns a Badge
Web applications rely on numerous underlying infrastructure components, including public key infrastructure (PKI). Discover the overall web application ecosystem with a focus on the OWASP Top 10 2017. Key concepts covered in this 13-video course include how to identify common web application security issues and their impacts; how tools such as Nmap, Metasploit, and Nessus can be used for benign and malicious purposes; and how the OWASP Top 10 helps to secure web applications. Next, you will learn the OWASP security tools; how to identify common web application architecture and development techniques and the role that clients and servers play; and how TLS supersedes SSL and tools such as SSL Labs can test PKI implementations. Learners then observe how PKI certificates can enhance web application security; how to configure HTTPS bindings for Microsoft IIS websites; and how to configure Microsoft IIS websites to require client certificates. Finally, learn how to configure HTTPS bindings for Linux Apache websites, and how to scan a public Internet site's PKI configuration to determine the site's security posture.
WHAT YOU WILL LEARN
-
identify common web application security issues and their impact, including embedded web apps in IoT devicesdefine how tools such as Nmap, Metasploit and Nessus can be used for benign and malicous purposesrecognize how the OWASP Top 10 helps to secure web applicationsrecognize OWASP security toolsidentify common web application architecture and development techniques and the role that clients and servers playrecall how TLS supersedes SSL and tools such as SSL Labs can test PKI implementations
-
recognize how PKI certificates can enhance web application securityconfigure an HTTPS binding for a Microsoft IIS web siteconfigure a Microsoft IIS web site to require client certificatesconfigure an HTTPS binding for a Linux Apache web sitescan a public Internet site's PKI configuration to determine the security posture of the siteimplement measures to secure the web application environment
IN THIS COURSE
-
1m 54s
-
4m 20s
-
3m 59s
-
6m 21s
-
3m 12s
-
5m 4s
-
5m 6s
-
5m 44s
-
3m 58s
-
3m 58s
-
7m 31s
-
3m 12s
-
6m 7s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.