OWASP

Course
Time
4 hours 32 minutes
Difficulty
Beginner
CEU/CPE
24

Video Transcription

00:00
everyone welcome back to the core. So in the last video, we talked about injection flaws, an injection attacks. Specifically, we're focused on sequel injection for the majority of it. As I mentioned, I've got a special guest. I know everyone was anticipating Beyonce's. She couldn't make it because of some concerts and that sort of stuff, because he has better things to do.
00:18
So I have another guest here. So who are you guessed?
00:21
Thank you for that very warm introduction. I know I'm not Beyonce, but hopefully I'm an acceptable replacement. I'm not
00:26
for those of you don't know who I am, that's totally fine. Most people don't. I'm Joe Perry. I'm the director of research. Here is cyber and I actually have a new course coming out. We're going a little bit of cross promotion for right now because it's related to all the things that Ken has been talking about in these old lost video.
00:41
The course that we have coming out is called breaking Stuff with Joe. It's a series of 30 minutes or less tool demonstration videos where we go over the tools history. It's designed when it's four. How to use the concept behind that tool. So if it's an S and m. P c enter, for example, it will discuss the S and M P Protocol. That simple network management protocol will figure out how that works. Will understand why it's useful.
01:00
A pen tester or
01:02
professional.
01:03
So we've got a bunch of these courses coming out a couple of weeks at least. So hopefully you're gonna find them just as useful as I found making them. And you're gonna be able to tie those back to this old boss course and the labs here in this course that kind of created. So I hope you enjoy this. I hope you're having fun learning about a loss. I hope to see you in breaking stuff with Joe over on Cyber. Eri on Damen.
01:22
Awesome. Thank you. I'm looking for

Up Next

OWASP

Established in 2001, the Open Web Application Security Project (OWASP) offers free security tools and resources to help organizations protect critical apps. Cybrary’s OWASP training course covers the organization’s popular “Top 10” risk assessment.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor