Vulnerabilities that Hide from Your Tools
Offered By: NDC Conferences via YouTube
Course Description
Overview
Explore methodologies for uncovering hidden vulnerabilities in application security during this conference talk from NDC Security 2022. Delve into the limitations of automated tools and learn how to identify vulnerabilities that often escape detection. Discover the differences between static and dynamic analysis, and understand the importance of examining business logic, weak passwords, configuration errors, and potential denial of service attacks. Investigate the risks posed by rogue developers, cryptography disasters, and human factors in security. Learn to spot secrets in unexpected places, handle false negatives, and address sensitive data exposure. Examine insecure APIs, third-party integrations, and the significance of threat modeling. Gain insights into full-circle development practices, preventive measures, and the value of security education. Explore the importance of vetting processes and default configurations in maintaining robust application security.
Syllabus
Introduction
About Jillian
AppSec Tools
Static vs Dynamic Analysis
Business Logic
Weak or reused passwords
Configuration whoopsies
Denial of Service
Rogue Developers
Cryptography Disaster
Humans
Secrets in Strange Places
False Negatives
Sensitive Data Exposure
Insecure APIs
ThirdParty Integration
No Naps
Lord Varus Approach
Threat Modeling
Full Circle Development
A Pound of Cure
Education
Default Configurations
Background Checks
Vet the Spies
Questions
Taught by
NDC Conferences
Related Courses
Dynamics of Ocean StructuresIndian Institute of Technology Madras via Swayam Secure Software Development: Verification and More Specialized Topics
Linux Foundation via edX Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight Autodesk Nastran In-CAD: Dynamic Analysis
LinkedIn Learning Developing Secure Software
LinkedIn Learning