OWASP: Web Application Security
OWASP 2017 | Intermediate
- 10 videos | 43m 4s
- Includes Assessment
- Earns a Badge
A number of high-level security controls such as web application firewalls and secure coding practices go a long way toward securing web applications. In this 10-video course, learners can explore vulnerability scanning and penetration testing tools and procedures. Key concepts covered in this course include learning to adhere to secure coding guidelines at all phases of the SDLC; how a web application firewall is much more of an in-depth solution for web application security than a traditional firewall; and how to configure a web application firewall for a Microsoft Azure web application. Next, learn why malicious users and ethical hackers perform network and vulnerability scans; learn the importance of conducting periodic penetration tests with the goal to exploit vulnerabilities to determine risk; how to perform a network scan by using Nmap, which identifies devices on the network. Conclude by observing how to perform a vulnerability scan using Nessus; and how to test the security of a web application with OWASP ZAP.
WHAT YOU WILL LEARN
adhere to secure coding guidelines at all phases of the SDLCdescribe how web application firewalls differ from traditional firewallsconfigure a web application firewall for a Microsoft Azure web applicationidentify why malicious users and ethical hackers perform network and vulnerability scansrecognize the importance of conducting periodic penetration tests
perform a network scan using Nmapperform a vulnerability scan using Nessustest the security of a web application using OWASP ZAPdiscover and test web application security
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course Mobile Security Threats