Integrity Training – OWASP Proactive Controls
The OWASP: Proactive Controls course is part of a series of training courses on the Open Web Application Security Project (OWASP). The OWASP Top Ten Proactive Controls is a list of security techniques that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. This training assists the developers who are new to secure development to ensure application security.
The OWASP Foundation was established with a purpose to secure the applications in such a way that they can be conceived, developed, acquired, operated, and maintained in a trusted way. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. This course along with the other courses in the series on OWASP provides a basic overview of the concepts that form an integral part of the OWASP core values.
Course Curriculum
- Start
Topic A: Overview – Part 1 (0:27)
- Start
Overview – Part 2 (13:44)
- Start
Overview – Part 3 (0:34)
- Start
Topic B: Verify Security – Part 1 (0:48)
- Start
Verify Security – Part 2 (13:20)
- Start
Verify Security – Part 3 (0:29)
- Start
Topic C: Parameterize Queries – Part 1 (0:22)
- Start
Parameterize Queries – Part 2 (30:49)
- Start
Parameterize Queries – Part 3 (0:18)
- Start
Topic D: Encode Data – Part 1 (0:31)
- Start
Encode Data – Part 2 (17:28)
- Start
Encode Data – Part 3 (0:26)
- Start
Topic E: Validate Inputs – Part 1 (0:26)
- Start
Validate Inputs – Part 2 (13:50)
- Start
Validate Inputs – Part 3 (0:28)
- Start
Topic F: Identity and Authentication Controls – Part 1 (0:21)
- Start
Identity and Authentication Controls – Part 2 (21:01)
- Start
Identity and Authentication Controls – Part 3 (0:16)
- Start
Chapter 01 Quiz
- Start
Topic A: Implement Access Controls – Part 1 (0:28)
- Start
Implement Access Controls – Part 2 (14:04)
- Start
Implement Access Controls – Part 3 (0:23)
- Start
Topic B: Protect Data – Part 1 (0:31)
- Start
Protect Data – Part 2 (18:07)
- Start
Protect Data – Part 3 (0:15)
- Start
Topic C: Logging and Intrusion Detection – Part 1 (0:24)
- Start
Logging and Intrusion Detection – Part 2 (9:30)
- Start
Logging and Intrusion Detection – Part 3 (0:21)
- Start
Topic D: Security Frameworks and Exception Handling – Part 1 (0:30)
- Start
Security Frameworks and Exception Handling – Part 2 (10:32)
- Start
Security Frameworks and Exception Handling – Part 3 (0:23)
- Start
Chapter 02 Quiz
Get Integrity Training – OWASP Proactive Controls at tenco.pro
Reviews
There are no reviews yet.