Securing Backend Applications - OWASP Recommendations

Securing Backend Applications - OWASP Recommendations

Hussein Nasser via YouTube Direct link

Broken Access Control

6 of 11

6 of 11

Broken Access Control

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Securing Backend Applications - OWASP Recommendations

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Building Secure Backends
  2. 2 Injection
  3. 3 Broken Authentication
  4. 4 Sensitive Data Exposure
  5. 5 XML External Entities XXE
  6. 6 Broken Access Control
  7. 7 Security Misconfiguration
  8. 8 XSS
  9. 9 Insecure Deserialization. 
  10. 10 Using Components with Known Vulnerabilities. 
  11. 11 Insufficient Logging & Monitoring. 

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.