Web application security (WASEC) Online

This course has been removed by Fast Lane Institute for Knowledge Transfer GmbH. View all learning products for Fast Lane Institute for Knowledge Transfer GmbH.

check_box_outline_blank

OWASP Top 10: #3 Injection and #4 Insecure Design

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration (2019)

Logo IT-Learning
|META_INFO|

Security-related incidents pose major threats to organizations of all sizes, as well as the customers they serve. The Open Web Application …

check_box_outline_blank

OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures

Logo IT-Learning
|META_INFO|

No one is immune to security vulnerabilities when it comes to web applications. We all live with the looming possibility that something cou…

check_box_outline_blank

Advanced Threat Modeling and Risk Assessment in DevSecOps

Logo IT-Learning
|META_INFO|

This course provides a structured approach to understanding threat modeling principles, risk assessment methodologies, and their applicatio…

check_box_outline_blank

Learning the OWASP Top 10 (2018)

Logo IT-Learning
|META_INFO|

It seems like there is a security-related incident in the news every day. What makes systems—and the software that runs them—vulnerable…

check_box_outline_blank

OWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures

Logo IT-Learning
|META_INFO|

Failures related to identity, authentication, and software and data integrity loom large in web application development. You need to keep s…

check_box_outline_blank

OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components

Logo IT-Learning
|META_INFO|

Security vulnerabilities should be top of mind when it comes to safely accessing web applications within an organization. There’s always …

check_box_outline_blank

OWASP Top 10: #7 XSS and #8 Insecure Deserialization

Logo IT-Learning
|META_INFO|

Recent changes in application architecture and technology have sparked new opportunities and ways of working. But with these new advancemen…

check_box_outline_blank

OWASP Top 10: #9 Security Logging and Monitoring Failures and #10 Server-Side Request Forgery

Logo IT-Learning
|META_INFO|

It’s important to protect your organization against security vulnerabilities, but how do you prepare for a possible attack? In this cours…

check_box_outline_blank

OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE) (2019)

Logo IT-Learning
|META_INFO|

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…