Securing Backend Applications - OWASP Recommendations
Offered By: Hussein Nasser via YouTube
Course Description
Overview
Explore the top 10 critical security vulnerabilities identified by the Open Web Application Security Project (OWASP) in this 28-minute video. Learn how to build secure backend applications by understanding and addressing issues such as injection attacks, broken authentication, sensitive data exposure, XML external entities (XXE), broken access control, security misconfigurations, cross-site scripting (XSS), insecure deserialization, using components with known vulnerabilities, and insufficient logging and monitoring. Gain insights from real-life examples and anecdotes to enhance your understanding of these crucial security concepts and improve your web application development practices.
Syllabus
Building Secure Backends
Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities XXE
Broken Access Control
Security Misconfiguration
XSS
Insecure Deserialization.
Using Components with Known Vulnerabilities.
Insufficient Logging & Monitoring.
Taught by
Hussein Nasser
Related Courses
Information Security and Risk Management in ContextUniversity of Washington via Coursera Designing and Executing Information Security Strategies
University of Washington via Coursera Intro to Information Security
Georgia Institute of Technology via Udacity Information Security and Risk Management: An Overview
University of Washington via Canvas Network Information Security- II
Indian Institute of Technology Madras via Swayam