Description
Size: 1.21 GB
What You Will Learn
- How to use the OWASP Top 10 to ensure your applications minimize the security risks in the list
- How Web Applications are built and delivered on top of the HTTP protocol
- Threat agents, attack vectors, and impact of the ten most critical web application security risks
- Identify and mitigate the ten most critical security risks by reviewing vulnerable source code
- Common exploitation techniques used to test software security