Techademy-cyber security-Application security

owasp-top-10-a8---insecure-deserialization ₹9,999.00
(0 vote)

OWASP Top 10: A8 – Insecure Deserialization

June 1, 2022 / No Comments

discover the key concepts covered in this course describe how the concept of objects, methods, and properties applies to scripting and software development identify how deserialization attacks occur recognize how to deploy security controls to mitigate deserialization attacks summarize the key concepts covered in this courseIntro Video: Object-oriented programming is…

₹9,999.00
Idenisys Support
owasp-top-10-a7---cross-site-scripting ₹6,999.00
(0 vote)

OWASP Top 10: A7 – Cross-site Scripting

June 1, 2022 / No Comments

discover the key concepts covered in this course describe how Java and JavaScript are used in web applications recognize how Cross-site Scripting (XSS) attacks occur run a XSS attack through web page forms run a XSS attack to hijack a client web browser deploy security controls to mitigate XSS attacks…

₹6,999.00
Idenisys Support
owasp-top-10-a6---security-misconfiguration ₹8,999.00
(0 vote)

OWASP Top 10: A6 – Security Misconfiguration

June 1, 2022 / No Comments

discover the key concepts covered in this course provide examples of security misconfigurations describe how application containers work manage Docker containers on a Linux computer deploy a cloud-based container registry deploy a cloud-based container apply security settings to users and computers using Microsoft Group Policy assign Azure policies to check…

₹8,999.00
Idenisys Support
owasp-top-10-a5---broken-access-control ₹14,999.00
(0 vote)

OWASP Top 10: A5 – Broken Access Control

June 1, 2022 / No Comments

discover the key concepts covered in this course differentiate between mandatory, discretionary, role-based, and attribute-based access control identify how broken access control attacks occur identify how HTTP requests and responses interact with web applications manage Windows file system permissions manage Linux file system permissions configure attribute-based file system permissions in…

₹14,999.00
Idenisys Support
owasp-top-10-a4---xml-external-entities Free
(0 vote)

OWASP Top 10: A4 – XML External Entities

June 1, 2022 / No Comments

OWASP Top 10: A4 – XML External Entities discover the key concepts covered in this course identify how Extensible Markup Language (XML) is used to describe data list various ways that XML attacks can be executed scan a web application for XML vulnerabilities execute an XML external entity attack describe…

owasp-top-10-a3---sensitive-data-exposure ₹8,999.00
(0 vote)

OWASP Top 10: A3 – Sensitive Data Exposure

June 1, 2022 / No Comments

discover the key concepts covered in this course list methods by which malicious actors can gain access to sensitive data describe what Personally Identifiable Information (PII) is and how it relates to data classification and security list common data privacy standards use Microsoft File Server Resource Manager (FSRM) in Windows…

₹8,999.00
Idenisys Support
owasp-top-10-a2---broken-authentication Free
(0 vote)

OWASP Top 10: A2 – Broken Authentication

June 1, 2022 / No Comments

OWASP Top 10: A2 – Broken Authentication discover the key concepts covered in this course differentiate between authentication and authorization recognize how weak authentication configurations can lead to system compromise hash user credentials encrypt user credentials use Wireshark to view plain text credential transmissions harden user authentication settings using Microsoft…

owasp-top-10-a1---injection ₹14,999.00
(0 vote)

OWASP Top 10: A1 – Injection

June 1, 2022 / No Comments

discover the key concepts covered in this course recognize types of injection attacks test a web app for injection vulnerabilities using the OWASP Zed Attack Proxy (ZAP) tool use freely available tools to run a SQL injection attack against a web application use freely available tools to run a command…

₹14,999.00
Idenisys Support
owasp-top-10-web-application-security Free
(0 vote)

OWASP Top 10: Web Application Security

June 1, 2022 / No Comments

discover the key concepts covered in this course identify components related to developing and running a web application recognize how to securely write code describe the purpose of the Open Web Application Security Project (OWASP) recognize the relevance of web application security testing list the benefits of using a secure…

owasp-top-10-items-a3-a2-a1 ₹6,999.00
(0 vote)

OWASP: Top 10 Items A3, A2, & A1

June 1, 2022 / No Comments

discover the subject areas covered in this course describe OWASP Top 10 2017 item A3, sensitive data exposure recognize how to prevent sensitive data disclosure enable BitLocker encryption for a web server disk volume describe OWASP Top 10 2017 item A2, broken authentication recognize how to secure authentication enable MFA…

₹6,999.00
Idenisys Support