Attacking OWASP - Exploiting the Top 10
Offered By: YouTube
Course Description
Overview
Explore the OWASP Top 10 vulnerabilities and learn effective attack techniques in this informative conference talk from BSides Augusta 2015. Gain insights into exploiting common web application security flaws as David Coursey demonstrates practical approaches to identifying and leveraging these vulnerabilities. Enhance your understanding of web application security and develop strategies to better protect against potential threats.
Syllabus
RT106 Attacking OWASP Exploiting the Top 10 David Coursey
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network