YoVDO

Securing Backend Applications - OWASP Recommendations

Offered By: Hussein Nasser via YouTube

Tags

Information Security (InfoSec) Courses Cross-Site Scripting (XSS) Courses Data Protection Courses Access Control Courses Web Application Security Courses Injection Vulnerabilities Courses

Course Description

Overview

Explore the top 10 critical security vulnerabilities identified by the Open Web Application Security Project (OWASP) in this 28-minute video. Learn how to build secure backend applications by understanding and addressing issues such as injection attacks, broken authentication, sensitive data exposure, XML external entities (XXE), broken access control, security misconfigurations, cross-site scripting (XSS), insecure deserialization, using components with known vulnerabilities, and insufficient logging and monitoring. Gain insights from real-life examples and anecdotes to enhance your understanding of these crucial security concepts and improve your web application development practices.

Syllabus

Building Secure Backends
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization. 
Using Components with Known Vulnerabilities. 
Insufficient Logging & Monitoring. 


Taught by

Hussein Nasser

Related Courses

Introduction to OWASP Top 10 Security Risks
A Cloud Guru
AWS SimuLearn: Cyber Security Threats
Amazon Web Services via AWS Skill Builder
AWS SimuLearn: Edge Protection
Amazon Web Services via AWS Skill Builder
Cloud Security Scanner: Qwik Start
Google via Google Cloud Skills Boost
OWASP Top 10: Broken Access Control
Codecademy