Главная
Study mode:
on
1
Introduction
2
Objective
3
Caveat
4
Methodology
5
Connection Detail Table
6
L1- The Startup Minimum
7
L2- The Midsized Company Software Team
8
L1- Are all network connections secure?
9
L1- Is every action authorization checked
10
L1- Are all inputs validated and sanitized?
11
L2- Patching and Updates
12
L2- Secure Storage
13
L2- Strong Authentication
14
L2- Know Common s/w Vulnerabilities and Mitigations
15
CWEs and CVEs
16
Common IT Infrastructure Vulnerabilities
17
Q&A
Description:
Learn how to rapidly assess the security posture of your application or service in this 48-minute tutorial. Discover a methodology to identify major security gaps in just an hour or two, even in fast-paced environments with limited access to security experts. Follow along as the instructor guides you through a sample application, demonstrating how to evaluate network connections, authorization checks, input validation, patching, secure storage, and authentication. Gain insights into common software vulnerabilities, CWEs, CVEs, and IT infrastructure vulnerabilities. By the end of this session, you'll be equipped with the knowledge to confidently identify and prioritize security vulnerabilities in your applications, improving your overall security posture.

Rapid Assessment of Service and Application Security - Application Design and Architecture

Data Science Dojo
Add to list
0:00 / 0:00