YoVDO

How to Review Code for Vulnerabilities - OWASP Standard Classification

Offered By: OWASP Foundation via YouTube

Tags

Application Security Courses Software Security Courses Security Vulnerabilities Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn essential techniques for conducting effective source code reviews to identify security vulnerabilities in applications. Explore the fundamental concepts necessary for code review, discover where to begin the review process, and uncover strategies for detecting various types of vulnerabilities. Gain insights into potential automation methods and participate in hands-on code review exercises. By the end of this 28-minute talk, acquire the skills to start identifying vulnerabilities in your own applications, enhancing your ability to create more secure software.

Syllabus

OWASP Standard Classification: How To Review Code For Vulnerabilities - Vickie Li


Taught by

OWASP Foundation

Related Courses

Blockchain Scalability and its Foundations in Distributed Systems
The University of Sydney via Coursera
Don's Introduction to Ethical Hacking for Beginners
Udemy
Hacking und Netzwerkanalyse mit Wireshark - Der Komplettkurs
Udemy
Penetration Testing of Identity, Authentication and Authorization Mechanism
Pluralsight
ASP.NET MVC 5 Identity: Authentication and Authorization
LinkedIn Learning