وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

OWASP Mobile Top 10 – Vulnerabilities to Avoid

سرفصل های دوره

Skills Necessary to Understand the Most Critical Mobile Application Security Risks


1. Introduction
  • 1. Introduction
  • 2. Course Content and Structure
  • 3. Lesson Quiz and Resources
  • 4. Ethics
  • 5. OWASP Mobile Top 10 - Overview

  • 2. Foundation Security Concepts
  • 1. Secure Software Development
  • 2. Addressing Risk
  • 3. Developing Threat Models
  • 4. Encryption 101

  • 3. Insecure Authentication Authorization
  • 1.1 Course Notes - Insecure Authentication Authorization.pdf
  • 1. OWASP Mobile #1 Insecure Authentication Authorization
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insecure Authentication Authorization.html

  • 4. Insecure Communication
  • 1.1 Course Notes - Insecure Communication.pdf
  • 1. OWASP Mobile #2 Insecure Communication
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insecure Communication.html

  • 5. Inadequate Supply Chain Security
  • 1.1 Course Notes - Inadequate Supply Chain Security.pdf
  • 1. OWASP Mobile #3 Inadequate Supply Chain Security
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Inadequate Supply Chain Security.html

  • 6. Inadequate Privacy Controls
  • 1.1 Course Notes - Inadequate Privacy Controls.pdf
  • 1. OWASP Mobile #4 Inadequate Privacy Controls
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Inadequate Privacy Controls.html

  • 7. Improper Credential Usage
  • 1.1 Course Notes - Improper Credential Usage.pdf
  • 1. OWASP Mobile #5 Improper Credential Use
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Improper Credential Use.html

  • 8. Insufficient Input Output Validation
  • 1.1 Course Notes - Insufficient IO Validation.pdf
  • 1. OWASP Mobile #6 Insufficient Input Output Validation
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insufficient Input Output Validation.html

  • 9. Security Misconfiguration
  • 1.1 Course Notes - Security Misconfiguration.pdf
  • 1. OWASP Mobile #7 Security Misconfiguration
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Security Misconfiguration.html

  • 10. Insufficient Cryptography
  • 1.1 Course Notes - Insufficient Cryptography.pdf
  • 1. OWASP Mobile #8 Insufficient Cryptography
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insufficient Cryptography.html

  • 11. Insecure Data Storage
  • 1.1 Course Notes - Insecure Data Storage.pdf
  • 1. OWASP Mobile #9 Insecure Data Storage
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insecure Data Storage.html

  • 12. Insufficient Binary Protections
  • 1.1 Course Notes - Insufficient Binary Protections.pdf
  • 1. OWASP Mobile #10 Insufficient Binary Protections
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insufficient Binary Protections.html

  • 13. Course Summary and Conclusion
  • 1. Conclusion
  • 45,900 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 29303
    حجم: 1307 مگابایت
    مدت زمان: 138 دقیقه
    تاریخ انتشار: 25 دی 1402
    دسته بندی محصول

    45,900 تومان
    افزودن به سبد خرید