OWASP, Part 3: Threats and Session Security

with expert Don Kiely

In this course, we’ll review and address some of the OWASP Top Ten threats. As hackers continue finding new ways to exploit systems we thought were secure, it’s imperative that application developers continue taking their coding approach and skills to all new levels. In this course we’ll look at building secure applications from the mindset of the hacker, and what a developer can do to avoid the news headlines as the latest security breach. You’ll also learn how both Authentication and Session Management can be exploited along with ways to minimize these threats.

Course Outline