Wait a minute..

Secure Development based on OWASP ASVS

The importance of security at the time of application development is feltby most business owners who depend on active business services to customers who use technology as a tool to interact

Live Virtual Classroom
Beginner 0(0 Ratings)
Created by Hacktrace Indonesia
What will I learn?
  • Provides direction for the use of safe codes
  • Give an overview of the consequences of using unsafe codes
  • Give an overview of the pattern of attacks that will occur against general technology
  • Provide an overview of the patterns of attack that might occur against certain programming languages and programming frameworks
  • Provides an attacker perspective to the application developer
Live virtual classroom schedule
Schedule not yet available
Live online features
  • Instructor led, virtual streaming of your course with instructor Q&A
Offers
  • Hacktrace Certification Exam will be send after 7 days after course completion

Curriculum for this course
Architecture Design and Threat Modeling
5 Lessons
  • Architecture Design and Threat Modeling
  • Authentication model
  • Secure session management schema
  • Access control
  • Validation and sanitization
  • Malicious input handling
  • Cryptography at rest
  • Error handling and logging
  • Data protection
  • Communication security
  • HTTP security configuration
  • Business logic secure implementation
  • Secure store of files and resources
  • Secure API implementation
  • Web services secure implementation
  • Web server secure configuration
  • Introduction to OWASP MASVS
  • Use case of OWASP MASVS
  • General introduction of MASVS Requirements
Requirements
  • Web programmer
  • Mobile application programmer
  • Full-stack developers
+ View more
Description

The importance of security at the time of application development is felt by most business owners who depend on active business services to customers who use technology as a tool to interact.

The speaker will bring the OWASP ASVS 4.0 material by directing participants' understanding towards offensive mindset and their consequences. This understanding will be given in the form of a demo or example.

This example of an offensive mindset will refer to the results of case studies of a number of web application attacks and mobile devices called OWASP Top 10 Web Application Attack and OWASP Top 10 Mobile Application Attack.

OWASP ASVS 4.0 is the result of a viewpoint of application developers resulting from the work of OWASP Testing Methodology.

+ View more
Other related courses

Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
Coming soon

Ask our team
Coming soon

Ask our team

Hi, you can chat with me

...