Skip main navigation

Mitigation

In this video, you will learn how to address typical vulnerabilities from security misconfigurations. Now that you have learned about security misconfigurations and how to take advantage of them using …

Introduction to the OWASP Top 10

This video introduces the background to OWASP and reviews the latest version of OWASP, and finally reviews how OWASP is built. As you may have seen on their website, the …

Exploitation

In this video, you will be shown what information you can derive from a system by taking advantage of a security misconfiguration for OWASP Juice Shop that you noted earlier …

Welcome to the OWASP Top 10

This video will explain what the Open Web Application Security Project (OWASP) is. The OWASP started as a non-profit organization and has now grown and established several local chapters across …

Threat Analysis

Security misconfigurations pose a significant risk to your system security. Security misconfigurations refer to actions or settings that lower a system’s resilience and make it more vulnerable to hackers. Watch …

Mitigation

In this video, you will learn what to look for and rectify in the source code to avoid flaws in your access control. Now that you have an understanding of …

Exploitation

You will now learn how to use a customer feedback feature to establish if there are weaknesses in a system’s access control. We have already used the customer feedback feature …

Threat Analaysis

In this video, you will learn about the final threat in the course: insufficient logging and monitoring. In this final section of the course, you will learn about the importance …

Mitigation

In this video, you will briefly review what you have learned about the risk associated with using components with known vulnerabilities, and you will then look at ways to mitigate …

Mitigation

In this video, you will see how credit card details are handled on the OWASP Juice Shop database, followed by tips on how to mitigate these vulnerabilities. You have now …

Exploitation: Practical Application

This video demonstrates how to use JSON web tokens to identify vulnerabilities associated with using certain tokens. You will follow a demonstration using OWASP Juice Shop that illustrates how to …

Exploitation: Hack Your Store

In this video, you will learn how to hack the OWASP Juice Shop database to access client credit card details. In the previous video, you set up your customer database …

Exploitation: Set Up Your Store

In this video, you will see a demonstration showing you how to set up the OWASP Juice Shop user database to include credit card details. The OWASP Juice Shop is …

Threat Analysis

This video gives you an overview of the need to protect sensitive data. Many systems store our sensitive data on their databases. In this video, you will see how the …

Threat Analysis

In this video, you will learn about the risks associated with including a component with known vulnerabilities in an application. You have already seen that there are common components used …