Web Application Security for Absolute Beginners (no coding!)
Description:
In an hour and a half you will understand web application security without having to code. I’m going to teach you the 10 most common threats identified by the  Open Web Application Security Project. This course will kick-start your career in security. Register and enjoy
Click Buy Now for immediate access
OWASP Top 10 Common Cyber Security Attacks! Stop hackers, manage web application security and apply security principles!
Lecture 1: Introduction to OWASP Top 10 (2017)
Lecture 2: OWASP 10 Update! (2021)
Lecture 4: Blocked Authentication and Session Management
Test 2: Broken authentication and session management
Lecture 5: Cross Site Scripting (XSS)
Test 3: Cross-Site Scripting (XSS)
Lecture 6: Access Control Crashes
Fourth Test: Broken Access Control – Short Test
Lecture 7: Security Errors
Test 5: Security Misconfiguration – Short Test
Lecture 8: Presenting Sensitive Data
Test 6: Exposure to sensitive data
Lecture 9: Protection from Insufficient Attack
Test 7: Insufficient protection from attack
Lecture 10: Cross-site forgery
Test 8: Cross-site request forgery
Lecture 11: Using components with known vulnerabilities
Test 9: Using components with known vulnerabilities
Lecture 12: Unprotected APIs
Test 10: Unprotected APIs
Lecture 13: XML External Entities – OWASP A4: 2017
Test 11: External XML entities (new)
Lecture 14: Unsafe Deserialization – OWASP A8: 2017
Test 12: Unsafe deserialization
Lecture 15: Insufficient Recording and Monitoring – OWASP A10: 2017
Thirteenth Test: Insufficient Recording and Insufficient Observation
Lecture 16: Encryption Failure – OWASP A02: 2021
Fourteenth test: encryption failed
Lecture 17: Insecure Design – OWASP A04: 2021
Lecture 18: Software Failures and Data Integrity – OWASP A08: 2021
Exam 16: Software and data integrity failure
Lecture 19: Server-side Request Forgery – OWASP A10:2021
Test 17: Forge the request on the server side
Lecture 20: Defense in depth
Test 18: Defending in depth
Lecture 22: Secure development processes
Test 20: Safe development processes
Lecture 23: How do you test if your website uses the latest security protocols
Lecture 24: Where can I (legally) test my hacking skills for free
Lecture 25: What are Unsafe Direct Object References?
like this course? Check out my software quality course!
Course Description In 1.5 hours, you will understand web application security without having to code. This course contains PDFs, video lectures in MP4, and exams. This course will kick-start your security career
I will teach you the 10 most common threats identified by the Open Web Application Security Project (OWASP). At the end of the course you will learn: 1) What are the top threats to OWASP 10Â and what they are, 2) The impact of each security threat to your business 3) How these security threats can be implemented by attackers/pentesters/hackers 4) How these security threats can be mitigatedÂ
You will be able to understand the above points without having to “understand” the code… For your convenience, I have combined the OWASP 2017 and OWASP 2013 Top 10 list into one list of 10 common web application security threats.
How is that possible? Threats are explained conceptually, because the implementation of the threat may vary depending on the situation. Therefore, having a general understanding of security threats, their implications, and potential solutions will provide you with the essential knowledge to mitigate the impact of these web application security threats. Hence, there is no need to experiment with security encryption or security testing.
Bonus item: – Defense in depth. This is one of the basic security principles. – Basic Explanation of STRIDE (Spoofing, Manipulation, Disclaimer, Disclosure of Information, Â Denial of Service, Elevation of Privilege). I’ve also added privacy by design resources in this course. That means Security by Design and Privacy by Design – An Overview of the Secure Software Development Process. Building Security into Your Delivery Process – Frequently Asked Questions. Ask a security question and I will answer it with a video.
Why include additional items, is the main course not exciting enough? Again, excellent question! Getting security right goes beyond web application security. With bonus material, I would like to inform you of complementary measures that should be taken into consideration.
I am fully convinced of the benefits, but I don’t understand why I should learn all this from you. Right, let me clarify by giving you an overview of my experience: – Head of Information Security (currently). Managing security, privacy and quality professionals. Responsible for implementing and maintaining a balanced regulatory risk position; Security and Privacy Operations Manager (two years). As Security Liaison on Strategic Accounts, I monitor the security of 2,500+ workstations, 500+ servers and 10+ firewalls and routers, reporting on the status of operational security to European and Dutch law, integrating intelligence findings from AVDS, Check Point, Nagios and Nessus Palo Alto Traps, SCCM, SCEP, SEP, SCOM, and SIEM; Part-time PhD candidate (7 years – to date). You read science, you will get knowledge! What more do you want – Software Quality Consultant (6,5 years). I have advised many large/small IT project managers on various software related aspects; Information Technology Auditor (one year). I have worked closely with accountants and audited large government IT projects; Quality Assurance Engineer (3 years). I have implemented large IT systems for large companies, and you can find more details on LinkedIn or my profile.
Go ahead and hit the sign up button, and I’ll see you in Lesson 1!
no. This course will teach you the basic concepts behind the 10 most common web application security threats so that you can ask questions and discuss them critically with software/operational engineers.
Depends on knowing the person judging your expertise. Most likely this will not be the case.
Sign up only when you’re new to secure coding, secure web development, and want a complete beginner’s perspective on web application security. This course has been specifically developed for: – (Project) managers who lead software projects, but have no clue how software engineers can mitigate potential security issues – Hiring software engineers who are hiring – Software engineers who want to update their knowledge of application security Web and Secure Cryptography Principles – Beginning Red Team, Blue Team, Yellow and Purple Team members, Hackers, Penetration Testers – Anyone interested in Web Application Security Basics or Top 10 OWASP explained in layman’s terms
I guess you will never ask! This course distinguishes itself from the current available information for the following reasons: – The existing OWASP documentation is technical and therefore difficult to understand (I will include a few examples from the technical documentation as resources you can download). – Unlike most other courses, you can actually claim 1 Continuing Professional Education (CPE) after fully completing this course – I will update this course with new videos on demand or when significant security issues arise with important implications for managers. Thus, over time, this course may well become a comprehensive security education! – I’ve included a lot of documents that explain detailed mitigation strategies. Please note that these documents contain code and are therefore more appropriate for people implementing or testing security fixes. – I have included a lot of links to websites that provide comprehensive background information. – That’s not all, there’s more…
Yes, you will get access immediately after purchasing this course.
This course link will be delivered to your email. By clicking on this link, you will be redirected to the course operator to view the course.
All orders are protected by SSL encryption – the highest industry standard for online security from trusted vendors.
Web Application Security for Absolute Beginners (no coding!) is backed with a 60 Day No Questions Asked Money Back Guarantee. If within the first 60 days of receipt you are not satisfied with Wake Up Lean™, you can request a refund by sending an email to the address given inside the product and we will immediately refund your entire purchase price, with no questions asked.