Extended Web application security in Python (EWASEC-PY)

This course has been removed by Fast Lane Institute for Knowledge Transfer GmbH. View all learning products for Fast Lane Institute for Knowledge Transfer GmbH.

check_box_outline_blank

OWASP Top 10: #3 Injection and #4 Insecure Design

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration (2019)

Logo IT-Learning
|META_INFO|

Security-related incidents pose major threats to organizations of all sizes, as well as the customers they serve. The Open Web Application …

check_box_outline_blank

OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures

Logo IT-Learning
|META_INFO|

No one is immune to security vulnerabilities when it comes to web applications. We all live with the looming possibility that something cou…

check_box_outline_blank

OWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures

Logo IT-Learning
|META_INFO|

Failures related to identity, authentication, and software and data integrity loom large in web application development. You need to keep s…

check_box_outline_blank

OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components

Logo IT-Learning
|META_INFO|

Security vulnerabilities should be top of mind when it comes to safely accessing web applications within an organization. There’s always …

check_box_outline_blank

OWASP Top 10: #9 Security Logging and Monitoring Failures and #10 Server-Side Request Forgery

Logo IT-Learning
|META_INFO|

It’s important to protect your organization against security vulnerabilities, but how do you prepare for a possible attack? In this cours…

check_box_outline_blank

Learning the OWASP Top 10 (2018)

Logo IT-Learning
|META_INFO|

It seems like there is a security-related incident in the news every day. What makes systems—and the software that runs them—vulnerable…

check_box_outline_blank

OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE) (2019)

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

Advanced Threat Modeling and Risk Assessment in DevSecOps

Logo IT-Learning
|META_INFO|

This course provides a structured approach to understanding threat modeling principles, risk assessment methodologies, and their applicatio…