Security Testing Python Web Applications (SECT-PYWA) Online

This course has been removed by Fast Lane Institute for Knowledge Transfer GmbH. View all learning products for Fast Lane Institute for Knowledge Transfer GmbH.

check_box_outline_blank

OWASP Top 10: #1 Injection and #2 Broken Authentication

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand and improve software se…

check_box_outline_blank

OWASP Top 10: #3 Injection and #4 Insecure Design

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

Learning the OWASP Top 10 (2018)

Logo IT-Learning
|META_INFO|

It seems like there is a security-related incident in the news every day. What makes systems—and the software that runs them—vulnerable…

check_box_outline_blank

OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE) (2019)

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

OWASP Top 10: #7 XSS and #8 Insecure Deserialization

Logo IT-Learning
|META_INFO|

Recent changes in application architecture and technology have sparked new opportunities and ways of working. But with these new advancemen…

check_box_outline_blank

Complete Guide to Application Security

Logo IT-Learning
|META_INFO|

Want to build apps so secure they make cybercriminals cry? This isn't your average security course–it's the insider's comprehensive playb…

check_box_outline_blank

Advanced Threat Modeling and Risk Assessment in DevSecOps

Logo IT-Learning
|META_INFO|

This course provides a structured approach to understanding threat modeling principles, risk assessment methodologies, and their applicatio…

check_box_outline_blank

OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures

Logo IT-Learning
|META_INFO|

No one is immune to security vulnerabilities when it comes to web applications. We all live with the looming possibility that something cou…

check_box_outline_blank

The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview

Logo IT-Learning
|META_INFO|

As artificial intelligence reshapes how we interact with technology, securing Large Language Models (LLMs) and their surrounding ecosystems…