Secure Coding - OWASP TOP 10
0
(0)
Indonesia
~

Secure Coding - OWASP TOP 10
Insecure software is undermining our financial, healthcare, defense, energy, and other critical infrastructure worldwide. As our digital, global infrastructure gets increasingly complex and interconnected, the difficulty of achieving application security increases exponentially. We can no longer afford to tolerate relatively simple security problems.
Konten Training
-
Introduction
-
Description
-
Implementation
-
Vulnerabilities Prevented
-
Description
-
Implementation Best Practices
-
Vulnerabilities Prevented
-
Tools
-
Description
-
Secure Queries
-
Secure Configuration, Authentication, and Communication
-
Vulnerabilities Prevented
-
Description
-
Contextual Output Encoding
-
Other Types of Encoding and Injection Defense
-
Vulnerabilities Prevented
-
Description
-
Syntax and Semantic Validity
-
Whitelisting vs Blacklisting
-
Client side and Server side Validation
-
Regular Expressions
-
Limits of Input Validation
-
Challenges of Validating Serialized Data
-
Unexpected User Input (Mass Assignment)
-
Validating and Sanitizing HTML
-
Validation Functionality in Libraries and Frameworks
-
Vulnerabilities Prevented
-
Description
-
Authentication Levels
-
Session Management
-
Caution
-
Vulnerabilities Prevented
-
Description
-
Access Control Design Principles
-
Vulnerabilities Prevented
-
Description
-
Data Classification
-
Encrypting Data in Transit
-
Encrypting Data at Rest
-
Vulnerabilities Prevented
-
Description
-
Benefits of Security Logging
-
Security Logging Implementation
-
Secure Logging Design
-
Description
-
Error Handling Mistakes
-
Positive Advice
-
Multiple Choice
00:00:00
Deskripsi
Insecure software is undermining our financial, healthcare,
defense, energy, and other critical infrastructure worldwide.
As our digital, global infrastructure gets increasingly complex
and interconnected, the difficulty of achieving application
security increases exponentially. We can no longer afford to
tolerate relatively simple security problems.
In this course, we will learn how to do secure coding or secure
development using The OWASP Top Ten Proactive Controls 2018 as
a guidance. The OWASP Top Ten Proactive Controls 2018 is a list
of security techniques that should be considered for every
software development project. This course is written for
developers to assist those new to secure development.
One of the main goals of this course is to provide concrete practical guidance that helps developers build secure software. These techniques should be applied proactively at the early stages of software development to ensure maximum effectiveness.
This course is intended to provide initial awareness around building secure software. This course will also provide a good foundation of topics to help drive introductory software security developer training. These controls should be used consistently and thoroughly throughout all applications. However, this course should be seen as a starting point rather than a comprehensive set of techniques and practices. A full secure development process should include comprehensive requirements from a standard such as the OWASP ASVS in addition to including a range of software development activities described in maturity models such as OWASP SAMM and BSIMM.
Penilaian Peserta
Ulasan
Training Lain Yang Serupa


NMAP scripting Engine ( NMAP NSE )
0
(0)Gratis


Dasar-Dasar MYSQL phpmyadmin
0
(0)Gratis


Sejarah & Pengenalan Nmap untuk pemula | Bahasa Indonesia
0
(0)Gratis


Beware of SQL Injection (How it Works) | Security Awareness
0
(0)Gratis


Nmap Tutorial from Zero to Hero Part #2
0
(0)Gratis


Nmap Tutorial from Zero to Hero Part #1
0
(0)Gratis


Clickjacking Attack for Example | Security Awareness
0
(0)Gratis


Delta ISO 27001 - Annex A.12 Keamanan Operasi Part 3
0
(0)Gratis


Delta ISO 27001 - Annex A.12 Keamanan Operasi Part 2
0
(0)Gratis


Delta ISO 27001 - Annex A.12 Keamanan Operasi Part 1 Struktur
0
(0)Gratis