OWASP Proactive Controls
3.2 (15 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
56 students enrolled

OWASP Proactive Controls

OWASP Proactive Controls
3.2 (15 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
56 students enrolled
Last updated 11/2018
English
English [Auto-generated]
Current price: $10.99 Original price: $199.99 Discount: 94% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3 hours on-demand video
  • 2 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to Udemy's top 3,000+ courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Proactive Control 1: Verify Security
  • Proactive Control 2: Parameterize Queries

  • Proactive Control 3: Encode Data

  • Proactive Control 4: Validate Inputs
  • Proactive Control 5: Identity and Authentication Controls
  • Proactive Control 6: Implement Access Controls
  • Proactive Control 7: Protect Data
  • Proactive Control 8: Logging and Intrusion Detection
  • Proactive Control 9: Security Frameworks
  • Proactive Control 10: Exception Handling
Requirements
  • The course requires basic knowledge of web applications and network security. Prior experience of working in a development environment is recommended but not required.
Description

The OWASP: Proactive Controls course is part of a series of training courses on the Open Web Application Security Project (OWASP). The OWASP Top Ten Proactive Controls is a list of security techniques that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. This training assists the developers who are new to secure development to ensure application security.

The OWASP Foundation was established with a purpose to secure the applications in such a way that they can be conceived, developed, acquired, operated, and maintained in a trusted way. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. This course along with the other courses in the series on OWASP provides a basic overview of the concepts that form an integral part of the OWASP core values.

Who this course is for:
  • Application security engineers
  • Network security engineers
  • Ethical hackers
  • Software developers
Course content
Expand all 30 lectures 02:51:08
+ Chapter 01 - Controls 1-5
18 lectures 01:55:39
Topic B: Verify Security - Part 1
00:48
Verify Security - Part 2
13:20
Verify Security - Part 3
00:29
Topic C: Parameterize Queries - Part 1
00:22
Parameterize Queries - Part 2
30:49
Parameterize Queries - Part 3
00:18
Topic D: Encode Data - Part 1
00:31
Encode Data - Part 2
17:28
Encode Data - Part 3
00:26
Topic E: Validate Inputs - Part 1
00:26
Validate Inputs - Part 2
13:50
Validate Inputs - Part 3
00:29
Topic F: Identity and Authentication Controls - Part 1
00:21
Identity and Authentication Controls - Part 2
21:01
Identity and Authentication Controls - Part 3
00:16
Review - Question
17 questions
+ Chapter 02 - Controls 6-10
12 lectures 55:29
Topic A: Implement Access Controls - Part 1
00:28
Implement Access Controls - Part 2
14:04
Implement Access Controls - Part 3
00:23
Topic B: Protect Data - Part 1
00:31
Protect Data - Part 2
18:07
Protect Data - Part 3
00:15
Topic C: Logging and Intrusion Detection - Part 1
00:24
Logging and Intrusion Detection - Part 2
09:30
Logging and Intrusion Detection - Part 3
00:21
Topic D: Security Frameworks and Exception Handling - Part 1
00:30
Security Frameworks and Exception Handling - Part 2
10:32
Security Frameworks and Exception Handling - Part 3
00:24
Review - Question
17 questions