YoVDO

Transitive Vulnerabilities Exploit in Real-life

Offered By: OWASP Foundation via YouTube

Tags

Cybersecurity Courses Network Security Courses Penetration Testing Courses Risk Analysis Courses Software Security Courses Vulnerability Assessment Courses Threat Modeling Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of transitive vulnerabilities and their real-world exploitation in this 40-minute conference talk presented by Liad Cohen and Eyal Paz at an OWASP Foundation event. Gain valuable insights into the nature of these complex security issues, understand their potential impact on systems, and learn about practical examples of how they can be exploited in real-life scenarios. Discover effective strategies for identifying, mitigating, and preventing transitive vulnerabilities to enhance your organization's overall security posture.

Syllabus

Transitive Vulnerabilities Exploit In Real-life - Liad Cohen & Eyal Paz


Taught by

OWASP Foundation

Related Courses

Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera
Internet Security
openHPI
Planning a Security Incident Response
Microsoft via edX
Cyber Security
CEC via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam