جمع جزء: 278,000 تومان
- × 1 عدد: Optimize Data Pipelines with Azure Data Factory and Synapse Analytics - 139,000 تومان
- × 1 عدد: Programming Numerical Methods in Python - 139,000 تومان
It’s important to protect your organization against security vulnerabilities, but how do you prepare for a possible attack? In this course, join instructor and application security expert Caroline Wong as she gives you an overview of the ninth and tenth most common vulnerabilities listed on the 2021 Open Web Application Security Project (OWASP) Top 10 List: security logging and monitoring failures and server-side request forgery.
Discover strategies to defend yourself against these two prominent types of attack, drawing from real-life examples along the way. Caroline offers insights on the latest, most effective prevention techniques to keep your web applications safe and secure, including sufficient user context, consistent monitoring and alerting, an incident response and recovery plan, network layer and application layer prevention, and authentication for internal services.
در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.
OWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures
OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
Artificial Intelligence and Application Security
فیلم یادگیری OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE)
OWASP Top 10: #9 Security Logging and Monitoring Failures and #10 Server-Side Request Forgery
فیلم یادگیری OWASP Top 10: #7 XSS and #8 Insecure Deserialization
OWASP Top 10: #3 Injection and #4 Insecure Design
آشنایی با معیارهای سنجش امنیت
آشنایی با حملات هکری OWASP Top 10 : انجام Injection و طراحی نا امن
فیلم یادگیری OWASP Top 10 : 9 Components with Known Vulnerabilities and 10 Insufficient Logging and Monitoring
✨ تا ۷۰% تخفیف با شارژ کیف پول 🎁
مشاهده پلن ها