Overview
Syllabus
- Introduction
- NordPass Sponsorship
- Course Overview
- The OWASP Top 10
- Installing OWASP Juice Shop
- Installing Foxy Proxy
- Exploring Burp Suite
- Introducing the Score Board
- SQL Injection Overview
- SQL Injection Walkthrough
- SQL Injection Defenses
- Broken Authentication Attacks and Defenses
- Testing for Broken Authentication
- Sensitive Data Exposure Attacks and Defenses
- Testing for Sensitive Data Exposure
- XML External Entities XXE Overview
- XXE Attacks and Defenses
- Broken Access Control Overview
- Broken Access Control Walkthrough
- Security Misconfigurations Overview
- Cross-Site Scripting XSS Overview
- Reflected XSS Walkthrough
- Stored XSS Walkthrough
- Preventing XSS
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging and Monitoring
- Conclusion
Taught by
The Cyber Mentor