Web Application Security in Python (WASEC-PY) Online

This course has been removed by Fast Lane Institute for Knowledge Transfer GmbH. View all learning products for Fast Lane Institute for Knowledge Transfer GmbH.

check_box_outline_blank

OWASP Top 10: #1 Injection and #2 Broken Authentication

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand and improve software se…

check_box_outline_blank

OWASP Top 10: #3 Injection and #4 Insecure Design

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

Learning the OWASP Top 10 (2018)

Logo IT-Learning
|META_INFO|

It seems like there is a security-related incident in the news every day. What makes systems—and the software that runs them—vulnerable…

check_box_outline_blank

OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE) (2019)

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

OWASP Top 10: #7 XSS and #8 Insecure Deserialization

Logo IT-Learning
|META_INFO|

Recent changes in application architecture and technology have sparked new opportunities and ways of working. But with these new advancemen…

check_box_outline_blank

OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures

Logo IT-Learning
|META_INFO|

No one is immune to security vulnerabilities when it comes to web applications. We all live with the looming possibility that something cou…

check_box_outline_blank

Advanced Threat Modeling and Risk Assessment in DevSecOps

Logo IT-Learning
|META_INFO|

This course provides a structured approach to understanding threat modeling principles, risk assessment methodologies, and their applicatio…

check_box_outline_blank

Learning the OWASP Top 10

Logo IT-Learning
|META_INFO|

No organization—no matter how large or small—is invulnerable to security breaches. What makes all of these systems, and the software th…

check_box_outline_blank

OWASP Top 10 Essentials

Logo OpenValue
|META_INFO|

Introduction OWASP is a worldwide organization focused on improving software security. For this goal they have built a list of the top 10 m…