195Results for "OWASP"
-
Complete Guide to Application Security7h 53m
Complete Guide to Application Security
By: Jerod Brennen
Course
-
Security Testing Essential Training4h 20m
Security Testing Essential Training
By: Jerod Brennen
Course
-
The OWASP API Security Top 10: An Overview41m
The OWASP API Security Top 10: An Overview
By: Davin Jackson
Course
-
The OWASP API 2023 Top 10: An Overview42m
The OWASP API 2023 Top 10: An Overview
By: Davin Jackson
Course
-
OWASP Top Ten4m
OWASP Top Ten
From: ISC2 Systems Security Certified Practitioner (SSCP) (2024) Cert Prep
Video
-
Technical standards4m
Technical standards
From: Securing the AI/ML Development Lifecycle: A Practical Guide to Secure AI Engineering
Video
-
Hands-on lab: Generate and analyze an SBOM for the OWASP juice shop1m
Hands-on lab: Generate and analyze an SBOM for the OWASP juice shop
From: Building Secure Software Supply Chains with Open-Source Tools
Video
-
What is the OWASP Top 10 list?2m
What is the OWASP Top 10 list?
From: The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview
Video
-
OWASP Top 10 series48s
OWASP Top 10 series
From: OWASP Top 10: #9 Security Logging and Monitoring Failures and #10 Server-Side Request Forgery
Video
-
OWASP Top 105m
OWASP Top 10
From: CompTIA Cybersecurity Analyst (CySA+) (CS0-003) Cert Prep (2024)
Video
-
OWASP Top 10 series43s
OWASP Top 10 series
From: OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Video
-
Web servers and OWASP3m
Web servers and OWASP
From: Complete Guide to Enterprise Cyber Defense
Video
-
MITRE ATT&CK and OWASP: Top 10 for threat modeling3m
MITRE ATT&CK and OWASP: Top 10 for threat modeling
From: Advanced Threat Modeling and Risk Assessment in DevSecOps
Video
-
OWASP Mobile Security Top Ten2m
OWASP Mobile Security Top Ten
From: Complete Guide to Application Security
Video
-
The OWASP Top Ten as a checklist6m
The OWASP Top Ten as a checklist
From: Threat Modeling for AI/ML Systems
Video
-
OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures29m
OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures
By: Caroline Wong
Course
-
OWASP Top 10 series50s
OWASP Top 10 series
From: OWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures
Video
-
Introduction to OWASP and other sources57s
Introduction to OWASP and other sources
From: Node.js: Security
Video
-
Hands-on lab: Scan the OWASP juice shop for vulnerable dependencies1m
Hands-on lab: Scan the OWASP juice shop for vulnerable dependencies
From: Building Secure Software Supply Chains with Open-Source Tools
Video
-
Introduction to OWASP dependency check1m
Introduction to OWASP dependency check
From: Node.js: Security
Video
-
Using resources on NIST and OWASP3m
Using resources on NIST and OWASP
From: Securing the IoT: Privacy
Video
-
A Bug Bounty Toolkit for Security Researchers2h 6m
A Bug Bounty Toolkit for Security Researchers
By: Bipin Gajbhiye
Course
-
OWASP DevSecOps Guideline4m
OWASP DevSecOps Guideline
From: Complete Guide to Application Security
Video
-
Setting up the environment: Docker and the OWASP juice shop2m
Setting up the environment: Docker and the OWASP juice shop
From: Building Secure Software Supply Chains with Open-Source Tools
Video
-
Hands-on lab: Find hardcoded secrets in the juice shop codebase1m
Hands-on lab: Find hardcoded secrets in the juice shop codebase
From: Building Secure Software Supply Chains with Open-Source Tools
Video
-
Visiting OWASP4m
Visiting OWASP
From: Ethical Hacking: Hacking Web Servers and Web Applications
Video
-
Understanding the OWASP Top 10 risks for LLMs5m
Understanding the OWASP Top 10 risks for LLMs
From: Certified Ethical Hacker (CEH)
Video
-
API risks and OWASP API Top 10 overview4m
API risks and OWASP API Top 10 overview
From: Cloud Security for DevSecOps Engineers: From Security Models to API Protection
Video
-
The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview1h 38m
The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview
By: Reet Kaur
Course
-
OWASP recommendations to defend against prompt injection4m
OWASP recommendations to defend against prompt injection
From: The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview
Video
-
OWASP API Security Top Ten3m
OWASP API Security Top Ten
From: Complete Guide to Application Security
Video