OWASP, Part 2 of 4: Forgery and Phishing

with Mike Benkovich

In this course you’ll look at building secure applications from the mindset of the hacker and what a developer can do to avoid the front pages of the latest exploit. You will see examples of Cross-Site Forgery, how a phishing email works, the vulnerabilities of open source components, and also redirects from unvalidated links.

Course Outline