YoVDO

Transitive Vulnerabilities Exploit in Real-life

Offered By: OWASP Foundation via YouTube

Tags

Cybersecurity Courses Network Security Courses Penetration Testing Courses Risk Analysis Courses Software Security Courses Vulnerability Assessment Courses Threat Modeling Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of transitive vulnerabilities and their real-world exploitation in this 40-minute conference talk presented by Liad Cohen and Eyal Paz at an OWASP Foundation event. Gain valuable insights into the nature of these complex security issues, understand their potential impact on systems, and learn about practical examples of how they can be exploited in real-life scenarios. Discover effective strategies for identifying, mitigating, and preventing transitive vulnerabilities to enhance your organization's overall security posture.

Syllabus

Transitive Vulnerabilities Exploit In Real-life - Liad Cohen & Eyal Paz


Taught by

OWASP Foundation

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity