Oreilly - OWASP Proactive Controls
by Integrity Training | Publisher: Stone River eLearning | Release Date: June 2019 | ISBN: 300000006CA303
The OWASP: Proactive Controls course is part of a series of training courses on the Open Web Application Security Project (OWASP). The OWASP Top Ten Proactive Controls is a list of security techniques that should be included in every software development project. They are ordered by order of importance, with control number 1 being the most important. This training assists the developers who are new to secure development to ensure application security. The OWASP Foundation was established with a purpose to secure the applications in such a way that they can be conceived, developed, acquired, operated, and maintained in a trusted way. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. This course along with the other courses in the series on OWASP provides a basic overview of the concepts that form an integral part of the OWASP core values.
- Chapter 01 - Controls 1-5
- Topic A: Overview - Part 1 00:00:27
- Overview - Part 2 00:13:44
- Overview - Part 3 00:00:35
- Topic B: Verify Security - Part 1 00:00:49
- Verify Security - Part 2 00:13:20
- Verify Security - Part 3 00:00:30
- Topic C: Parameterize Queries - Part 1 00:00:22
- Parameterize Queries - Part 2 00:30:50
- Parameterize Queries - Part 3 00:00:18
- Topic D: Encode Data - Part 1 00:00:32
- Encode Data - Part 2 00:17:29
- Encode Data - Part 3 00:00:26
- Topic E: Validate Inputs - Part 1 00:00:26
- Validate Inputs - Part 2 00:13:50
- Validate Inputs - Part 3 00:00:29
- Topic F: Identity and Authentication Controls - Part 1 00:00:21
- Identity and Authentication Controls - Part 2 00:21:02
- Identity and Authentication Controls - Part 3 00:00:16
- Chapter 02 - Controls 6-10
- Topic A: Implement Access Controls - Part 1 00:00:28
- Implement Access Controls - Part 2 00:14:05
- Implement Access Controls - Part 3 00:00:23
- Topic B: Protect Data - Part 1 00:00:32
- Protect Data - Part 2 00:18:07
- Protect Data - Part 3 00:00:16
- Topic C: Logging and Intrusion Detection - Part 1 00:00:24
- Logging and Intrusion Detection - Part 2 00:09:30
- Logging and Intrusion Detection - Part 3 00:00:22
- Topic D: Security Frameworks and Exception Handling - Part 1 00:00:30
- Security Frameworks and Exception Handling - Part 2 00:10:33
- Security Frameworks and Exception Handling - Part 3 00:00:24
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.