YoVDO

Transitive Vulnerabilities Exploit in Real-life

Offered By: OWASP Foundation via YouTube

Tags

Cybersecurity Courses Network Security Courses Penetration Testing Courses Risk Analysis Courses Software Security Courses Vulnerability Assessment Courses Threat Modeling Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of transitive vulnerabilities and their real-world exploitation in this 40-minute conference talk presented by Liad Cohen and Eyal Paz at an OWASP Foundation event. Gain valuable insights into the nature of these complex security issues, understand their potential impact on systems, and learn about practical examples of how they can be exploited in real-life scenarios. Discover effective strategies for identifying, mitigating, and preventing transitive vulnerabilities to enhance your organization's overall security posture.

Syllabus

Transitive Vulnerabilities Exploit In Real-life - Liad Cohen & Eyal Paz


Taught by

OWASP Foundation

Related Courses

Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera
Engineering Maintainable Android Apps
Vanderbilt University via Coursera
Software Design as an Element of the Software Development Lifecycle
University of Colorado System via Coursera
Secure Software Development
Pluralsight
Secure Software Concepts for CSSLPĀ®
Pluralsight