Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Exploring the OWASP Top Ten (TT8150)

Detailed Exploration of the Current OWASP Top Ten – The Leading Source for Defining the Most Significant Application Security Vulnerabilities.

The impact for exploited software is obvious. We are beyond the point where vulnerabilties must be addressed. The recently updated OWASP Top 10 has become the most recognized source for defining the most significant vulnerabilities. This series of quick, hard-hitting sessions sets the context and charges through each of the OWASP vulnerabilities. Each virtual, instructor-led session provides a solid set of information for developers, testers, and other stakeholders about understanding, identifying, and mitigating a vulnerability. These short, intense sessions maximize the flow of information in an effective and interactive manner.

Students who attend this PCI Compliant course will gain an understanding of the recently updated OWASP Top 10. Each of these sessions provides useful insights, discussions, and, in many cases, demonstrations of the application vulnerabilities that are plaguing the industry.

GK# 101063 Vendor# TT8150
Vendor Credits:
No matching courses available.
Start learning as soon as today! Click Add To Cart to continue shopping or Buy Now to check out immediately.
Access Period:
Scheduling a custom training event for your team is fast and easy! Click here to get started.

Who Should Attend?

Technical Managers, Developers, Stakeholders, Architects, Engineers and anyone else involved in Application Security initiatives and current standards.

What You'll Learn

After a quick examination of the context for application security and the OWASP Top 10, each of the vulnerabilities are covered in detail. After the ten vulnerabilities are examined in detail, we wrap up with sessions on next steps for attendees to take as well as an overview of Threat Modeling. 

Attendees will gain an understanding of:

  • The mechanism by which the vulnerability is exploited. Often the exploitability of a vulnerability is rooted in an underlying pattern that is valid across many technologies and architectures.
  • The prevalence of the vulnerability, including characteristics to focus on during design and code reviews to help detect potential issues.
  • The potential consequences of a successful exploit.
  • The measures that can be taken to eliminate, prevent, or minimize the risk of an exploited vulnerability.
  • The relative effectiveness of scanners and other tools in detecting the vulnerability being discussed.
  • Generic and code-specific references that can be utilized after the session.

Prerequisites

This is an introductory-level course designed for technical stakeholders and web developers. Familiarity with programming is helpful but not required.

Follow-On Courses

Our Application Security Suite include a wide variety of follow-on courses and learning paths for leveraging end to end (and always up-to-date) skills for secure software design, coding and end to end development skills and best practices. Please inquire for recommendations based on your specific role, goals and programming languages.