In this video, you will learn how to address typical vulnerabilities from security misconfigurations. Now that you have learned about security misconfigurations and how to take advantage of them using …
This video introduces the background to OWASP and reviews the latest version of OWASP, and finally reviews how OWASP is built. As you may have seen on their website, the …
In this video, you will be shown what information you can derive from a system by taking advantage of a security misconfiguration for OWASP Juice Shop that you noted earlier …
This video will explain what the Open Web Application Security Project (OWASP) is. The OWASP started as a non-profit organization and has now grown and established several local chapters across …
Security misconfigurations pose a significant risk to your system security. Security misconfigurations refer to actions or settings that lower a system’s resilience and make it more vulnerable to hackers. Watch …
In this video, you will learn what to look for and rectify in the source code to avoid flaws in your access control. Now that you have an understanding of …
You will now learn how to use a customer feedback feature to establish if there are weaknesses in a system’s access control. We have already used the customer feedback feature …
In this video, you will learn about the final threat in the course: insufficient logging and monitoring. In this final section of the course, you will learn about the importance …
In this video, you will briefly review what you have learned about the risk associated with using components with known vulnerabilities, and you will then look at ways to mitigate …
In this video, you will see how credit card details are handled on the OWASP Juice Shop database, followed by tips on how to mitigate these vulnerabilities. You have now …
This video demonstrates how to use JSON web tokens to identify vulnerabilities associated with using certain tokens. You will follow a demonstration using OWASP Juice Shop that illustrates how to …
In this video, you will learn how to hack the OWASP Juice Shop database to access client credit card details. In the previous video, you set up your customer database …
In this video, you will see a demonstration showing you how to set up the OWASP Juice Shop user database to include credit card details. The OWASP Juice Shop is …
This video gives you an overview of the need to protect sensitive data. Many systems store our sensitive data on their databases. In this video, you will see how the …
In this video, you will learn about the risks associated with including a component with known vulnerabilities in an application. You have already seen that there are common components used …