Your browser does not support this video.
OWASP, Part 4 of 4: Misconfiguration and Data Encryption
with Don Kiely
In this course we'll be digging more deeply into the OWASP Threat list. How vulnerable are you if your frameworks, servers and applications are not configured correctly, left in out-of-the-box configurations, or are not kept up-to-date? Then we'll move into Sensitive Data Exposure and techniques to store data. Finally, we'll cover insecure versus secure cryptography, what data needs to be protected, and why you should protect it.Course Outline