In this course, we’ll review and address some of the OWASP Top Ten threats. As hackers continue finding new ways to exploit systems we thought were secure, it’s imperative that application developers continue taking their coding approach and skills to all new levels. In this course we’ll look at building secure applications from the mindset of the hacker, and what a developer can do to avoid the news headlines as the latest security breach. You’ll also learn how both Authentication and Session Management can be exploited along with ways to minimize these threats.
Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.
This course is for users with experience with developing web applications using C# or other object oriented programming languages.
Meet the expert
Don Kiely is a featured instructor on many of our SQL Server and Visual Studio courses. He is a nationally recognized author, instructor, and consultant specializing in Microsoft technologies. Don has many years of teaching experience, is the author or co-author of several programming books, and has spoken at many industry conferences and user groups. In addition, Don is a consultant for a variety of companies that develop distributed applications for public and private organizations.
Time to complete
OWASP Overview (09:32)
Top Ten Threats (27:15)
Authentication & Session Threats (30:38)
Threat Examples (30:38)