Course Content

Module 1: Web Defense Fundamentals

06:15
1.1 OWASP Top 10 and SQL Injection
04:35
1.2 Broken Authentication
04:50
1.3 Sensitive Data Exposure
03:13
1.4 XML External Entities
02:20
1.5 Broken Access Control
04:02
1.6 Security Misconfiguration
03:10
1.7 Cross Site Scripting
03:12
1.8 Insecure Deserialization
03:11
1.9 Using Components
04:01
1.10 Insufficient Logging and Monitoring
12:23
1.11 SQL Injection

Course Description

In Web Defense Fundamentals, Ken Underhill takes you through the different aspects of Web application Security. You will learn OWASP top 10 and the vulnerabilities that are found across the web applications. Detection and remediation for OWASP top 10 are covered. By learning this course, organizations and individuals can ensure that their web applications are safely deployed and secure against the prying eyes of hackers, ensuring that industrial standards of Open Web Application Security Project (OWASP) are met.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor

Provided By

Cybrary Logo

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Web Defense Fundamentals Certificate of Completion