YoVDO

OWASP Top 10 2017: Exploit and Mitigation

Offered By: Udemy

Tags

Cybersecurity Courses Web Application Security Courses Secure Coding Courses

Course Description

Overview

Web Application Pentesting and Mitigations

What you'll learn:
  • Web Application Pentesting
  • Completing 20 exercise of Mutillidae Vulnerable Web Application
  • OWASP top 10 2017
  • Mitigations for each vulnerability
  • Secure code for mitigation

We will be looking at the OWASP Top 10 web attacks 2017. Students are going to understand each attack by practicing them on their own with the help of this course. We will use Mutillidae 2 Vulnerable Web Application for all attack practice. We will start from setting up the lab to exploiting each vulnerability.

This course not just focuses on attacks but also helps understanding the mitigations for each vulnerability.

Students will understand the mitigations through Secure Source Codes and Best Practices provided in this course that should be followed by the developers to protect their web application from these vulnerabilities.


Taught by

Nayan Das

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network