Understanding Vulnerabilities and Security Threats (WSKF603)

Full Details
Level
Price
Common Core
Images
No items found.

Participants will gain an in-depth understanding of each item in the OWASP® Top 10 with hands-on experience exploiting and defending against each vulnerability. The course focuses on understanding common mistakes developers make and the techniques needed to battle vulnerabilities using a test application tailored to their preferred development language.

This course is designed for developers and security professionals who want to deepen their understanding of web application security with hands-on learning in exploiting and defending against vulnerabilities.

Full Details
Formats: 
Part of resource: 
Posted 
Jul 2024
This resource has religious influence.

Similar resources

About The Linux Foundation

The key to a successful open technology project is to ensure a neutral playing field for all developers, technologists, and companies to collectively contribute to project evolution and growth. The Linux Foundation was built on the idea of the democratization of code and scaling adoption, for all projects equally. Expert legal and governance support programs ensure everyone is on the same playing field.

More by The Linux Foundation

thumbnail
WebAssembly Components: From Cloud to Edge (LFD134)
WebAssembly Components: From Cloud to Edge (LFD134)
College & Adult
thumbnail
Threat Modeling: The Essentials Toolkit (SKF201)
Threat Modeling: The Essentials Toolkit (SKF201)
College & Adult
thumbnail
Besu Essentials: Creating a Private Blockchain Network (LFS176x)
Besu Essentials: Creating a Private Blockchain Network (LFS176x)
College & Adult
thumbnail
Linux システム管理基礎 (LFS207-JP)
Linux システム管理基礎 (LFS207-JP)
College & Adult
thumbnail
Machine Learning & AI Introduction (RXM402)
Machine Learning & AI Introduction (RXM402)
College & Adult
thumbnail
Retrieval Augmented Generation (RAG) Introduction (RXM403)
Retrieval Augmented Generation (RAG) Introduction (RXM403)
College & Adult