How to Review Code for Vulnerabilities - OWASP Standard Classification
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Learn essential techniques for conducting effective source code reviews to identify security vulnerabilities in applications. Explore the fundamental concepts necessary for code review, discover where to begin the review process, and uncover strategies for detecting various types of vulnerabilities. Gain insights into potential automation methods and participate in hands-on code review exercises. By the end of this 28-minute talk, acquire the skills to start identifying vulnerabilities in your own applications, enhancing your ability to create more secure software.
Syllabus
OWASP Standard Classification: How To Review Code For Vulnerabilities - Vickie Li
Taught by
OWASP Foundation
Related Courses
Blockchain Scalability and its Foundations in Distributed SystemsThe University of Sydney via Coursera Don's Introduction to Ethical Hacking for Beginners
Udemy Hacking und Netzwerkanalyse mit Wireshark - Der Komplettkurs
Udemy Penetration Testing of Identity, Authentication and Authorization Mechanism
Pluralsight ASP.NET MVC 5 Identity: Authentication and Authorization
LinkedIn Learning