وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

OWASP Mobile Top 10 – Vulnerabilities to Avoid

سرفصل های دوره

Skills Necessary to Understand the Most Critical Mobile Application Security Risks


1. Introduction
  • 1. Introduction
  • 2. Course Content and Structure
  • 3. Lesson Quiz and Resources
  • 4. Ethics
  • 5. OWASP Mobile Top 10 - Overview

  • 2. Foundation Security Concepts
  • 1. Secure Software Development
  • 2. Addressing Risk
  • 3. Developing Threat Models
  • 4. Encryption 101

  • 3. Insecure Authentication Authorization
  • 1.1 Course Notes - Insecure Authentication Authorization.pdf
  • 1. OWASP Mobile #1 Insecure Authentication Authorization
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insecure Authentication Authorization.html

  • 4. Insecure Communication
  • 1.1 Course Notes - Insecure Communication.pdf
  • 1. OWASP Mobile #2 Insecure Communication
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insecure Communication.html

  • 5. Inadequate Supply Chain Security
  • 1.1 Course Notes - Inadequate Supply Chain Security.pdf
  • 1. OWASP Mobile #3 Inadequate Supply Chain Security
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Inadequate Supply Chain Security.html

  • 6. Inadequate Privacy Controls
  • 1.1 Course Notes - Inadequate Privacy Controls.pdf
  • 1. OWASP Mobile #4 Inadequate Privacy Controls
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Inadequate Privacy Controls.html

  • 7. Improper Credential Usage
  • 1.1 Course Notes - Improper Credential Usage.pdf
  • 1. OWASP Mobile #5 Improper Credential Use
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Improper Credential Use.html

  • 8. Insufficient Input Output Validation
  • 1.1 Course Notes - Insufficient IO Validation.pdf
  • 1. OWASP Mobile #6 Insufficient Input Output Validation
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insufficient Input Output Validation.html

  • 9. Security Misconfiguration
  • 1.1 Course Notes - Security Misconfiguration.pdf
  • 1. OWASP Mobile #7 Security Misconfiguration
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Security Misconfiguration.html

  • 10. Insufficient Cryptography
  • 1.1 Course Notes - Insufficient Cryptography.pdf
  • 1. OWASP Mobile #8 Insufficient Cryptography
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insufficient Cryptography.html

  • 11. Insecure Data Storage
  • 1.1 Course Notes - Insecure Data Storage.pdf
  • 1. OWASP Mobile #9 Insecure Data Storage
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insecure Data Storage.html

  • 12. Insufficient Binary Protections
  • 1.1 Course Notes - Insufficient Binary Protections.pdf
  • 1. OWASP Mobile #10 Insufficient Binary Protections
  • 2. Describing the Vulnerability
  • 3. Threat Modeling
  • 4. Detection and Prevention
  • 5. Quiz - Insufficient Binary Protections.html

  • 13. Course Summary and Conclusion
  • 1. Conclusion
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 29303
    حجم: 1307 مگابایت
    مدت زمان: 138 دقیقه
    تاریخ انتشار: ۲۵ دی ۱۴۰۲
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید