OWASP: Top 10 & Web Applications
OWASP 2017
| Intermediate
- 13 videos | 1h 26s
- Includes Assessment
- Earns a Badge
Web applications rely on numerous underlying infrastructure components, including public key infrastructure (PKI). Discover the overall web application ecosystem with a focus on the OWASP Top 10 2017. Key concepts covered in this 13-video course include how to identify common web application security issues and their impacts; how tools such as Nmap, Metasploit, and Nessus can be used for benign and malicious purposes; and how the OWASP Top 10 helps to secure web applications. Next, you will learn the OWASP security tools; how to identify common web application architecture and development techniques and the role that clients and servers play; and how TLS supersedes SSL and tools such as SSL Labs can test PKI implementations. Learners then observe how PKI certificates can enhance web application security; how to configure HTTPS bindings for Microsoft IIS websites; and how to configure Microsoft IIS websites to require client certificates. Finally, learn how to configure HTTPS bindings for Linux Apache websites, and how to scan a public Internet site's PKI configuration to determine the site's security posture.
WHAT YOU WILL LEARN
-
identify common web application security issues and their impact, including embedded web apps in IoT devicesdefine how tools such as Nmap, Metasploit and Nessus can be used for benign and malicous purposesrecognize how the OWASP Top 10 helps to secure web applicationsrecognize OWASP security toolsidentify common web application architecture and development techniques and the role that clients and servers playrecall how TLS supersedes SSL and tools such as SSL Labs can test PKI implementations
-
recognize how PKI certificates can enhance web application securityconfigure an HTTPS binding for a Microsoft IIS web siteconfigure a Microsoft IIS web site to require client certificatesconfigure an HTTPS binding for a Linux Apache web sitescan a public Internet site's PKI configuration to determine the security posture of the siteimplement measures to secure the web application environment
IN THIS COURSE
-
1.Course Overview1m 54sUP NEXT
-
2.Web Application Security Flaws4m 20s
-
3.Common Malicious User Tools3m 59s
-
4.OWASP Top 10 20176m 21s
-
5.OWASP Tools3m 12s
-
6.Web Application Architecture5m 4s
-
7.SSL and TLS5m 6s
-
8.PKI5m 44s
-
9.IIS Web Server HTTPS Bindings3m 58s
-
10.Client HTTPS Certificates3m 58s
-
11.Apache Web Server HTTPS Binding7m 31s
-
12.PKI Certificate Implementation Testing3m 12s
-
13.Exercise: Secure the Web Application Environment6m 7s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.