OWASP On-Demand: Comprehensive (Forgery, Phishing, Hacking, Controls) Course Outline
**Note: This is an On-Demand Self-Study Course, 2 days of content, 6-months unlimited access, $195**
(Applicable State and Local taxes may be added for On-Demand purchases, depending on your location.)
You may take this course at any time; there are no set dates. The course covers Open Web Application Security Project (OWSAP) Forgery and Phishing, Avoiding Hacker Tricks, Proactive Controls, and Threats Fundamentals topics.
About This Course
This Online On-Demand (self-study) training course includes expert lectures, PowerPoint visuals, and demonstrations. You will be able to follow along and successfully complete the course by completing the quizzes and exams. You do not need to own the software for the course and will be able to access the course from any device, provided you have internet access.
When you purchase this OWSAP On-Demand course from ONLC you will receive a printed book to supplement your learning at no charge.
Duration
This course takes 2 days to complete and includes 8h 39m of video presentation.
Course Outline
Forgery and Phishing
Topic A: Cross-Site Request Forgery
Topic B: Vulnerable Components
Topic C: Redirects
Avoiding Hacker Tricks
Topic A: Introduction
Topic B: Know Your Threats
Topic C: Cross Site Scripting
Topic D: SQL Injection Attack
Topic E: Insecure Object Reference
Topic F: Integer Overflow
Proactive Controls
Chapter 01 - Controls 1-5
Topic A: Overview
Topic B: Verify Security
Topic C: Parameterize Queries
Topic D: Encode Data
Topic E: Validate Inputs
Topic F: Identity and Authentication Controls
Chapter 02 - Controls 6-10
Topic A: Implement Access Controls
Topic B: Protect Data
Topic C: Logging and Intrusion Detection
Topic D: Security Frameworks and Exception Handling
Threats Fundamentals
Chapter 01 - Understanding Threats
Topic A: OWASP Overview
Topic B: Top Ten Threats
Chapter 02 - Session Security
Topic A: Authentication and Session Threats
Topic B: Threat Examples
Chapter 03 - Security Misconfiguration
Topic A: Security Misconfiguration
Topic B: Misconfiguration Examples
Chapter 04 - Data Exposure and Cryptography
Topic A: Sensitive Data Exposure
Topic B: Insecure Cryptographic Storage
Topic C: Function Level Access Control
View outline in Word
GOWA18