Instructional Video5:27
Curated Video

A Detailed Guide to the OWASP Top 10 - API3:2023 Broken Object Property Level Authorization

Higher Ed
In this session, we will uncover the dangers of Broken Object Property Level Authorization and learn effective prevention techniques.
Instructional Video6:33
Curated Video

A Detailed Guide to the OWASP Top 10 - API2:2023 Broken Authentication

Higher Ed
In this video, examine the critical security risk of Broken Authentication within APIs and discuss methods for securing authentication mechanisms.
Instructional Video6:49
Curated Video

A Detailed Guide to the OWASP Top 10 - API1:2023 Broken Object Level Authorization (BOLA)

Higher Ed
In this session, we will delve into the Broken Object Level Authorization risk, its implications, and strategies for mitigation.
Instructional Video3:25
Curated Video

A Detailed Guide to the OWASP Top 10 - API Endpoints

Higher Ed
In this video, we will learn about API endpoints, their role in API architecture, and how they interact with web applications.
Instructional Video8:43
Curated Video

A Detailed Guide to the OWASP Top 10 - Introduction to APIs

Higher Ed
In this session, we will explore the fundamentals of APIs, their importance in modern web applications, and the basics of how they work.
Instructional Video1:14
Curated Video

A Detailed Guide to the OWASP Top 10 - Section Intro

Higher Ed
In this video, we introduce the focus on OWASP's Top 10 API Security Risks for 2023, setting the stage for deep dives into each risk.
Instructional Video2:56
Curated Video

A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery Prevention

Higher Ed
This video explains the prevention of Server-Side Request Forgery.
Instructional Video8:14
Curated Video

A Detailed Guide to the OWASP Top 10 - #10 Server-Side Request Forgery

Higher Ed
This video explains A10: 2021 - Server-Side Request Forgery (SSRF).
Instructional Video3:09
Curated Video

A Detailed Guide to the OWASP Top 10 - #9 Security Logging and Monitoring Failures Prevention

Higher Ed
This video explains the steps to prevent security logging and monitoring failures.
Instructional Video8:16
Curated Video

A Detailed Guide to the OWASP Top 10 - #9 Security Logging and Monitoring Failures

Higher Ed
This video explains OWASP 09 - security logging and monitoring failures.
Instructional Video2:02
Curated Video

A Detailed Guide to the OWASP Top 10 - Software and Data Integrity Failures Prevention

Higher Ed
This video explains how we can prevent software and data integrity failures.
Instructional Video2:28
Curated Video

A Detailed Guide to the OWASP Top 10 - #8 Software and Data Integrity Failures

Higher Ed
This video explains A08: 2021 - software and data integrity failures.
Instructional Video2:48
Curated Video

A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures Prevention

Higher Ed
This video explains how to prevent identification and authentication failures.
Instructional Video10:04
Curated Video

A Detailed Guide to the OWASP Top 10 - #7 Identification and Authentication Failures

Higher Ed
This video explains OWASP 07 - identification and authentication failures.
Instructional Video2:20
Curated Video

A Detailed Guide to the OWASP Top 10 - #6 Vulnerable and Outdated Components Prevention

Higher Ed
This video explains how to prevent vulnerable and outdated components from becoming an issue.
Instructional Video4:56
Curated Video

A Detailed Guide to the OWASP Top 10 - #6 Vulnerable and Outdated Components

Higher Ed
This video explains the A06: 2021 - vulnerable and outdated components.
Instructional Video2:00
Curated Video

A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration Prevention

Higher Ed
This video explains the steps to be taken to prevent the OWASP 05 security misconfiguration.
Instructional Video5:25
Curated Video

A Detailed Guide to the OWASP Top 10 - #5 Security Misconfiguration

Higher Ed
This video explains the A05 - security misconfiguration using an attack scenario.
Instructional Video4:14
Curated Video

A Detailed Guide to the OWASP Top 10 - #4 Insecure Design Prevention

Higher Ed
This video explains how to prevent insecure design when developing software.
Instructional Video9:13
Curated Video

A Detailed Guide to the OWASP Top 10 - #4 Insecure Design

Higher Ed
This video explains the A04: 2021 - insecure design, which focuses on risks related to design and architectural flaws.
Instructional Video7:53
Curated Video

A Detailed Guide to the OWASP Top 10 - #3 Cross-Site Scripting Attacks

Higher Ed
This video explains another important client-side based attack, which is called the cross-site scripting attack.
Instructional Video16:25
Curated Video

A Detailed Guide to the OWASP Top 10 - #3 SQL Injection Attacks

Higher Ed
This video explains the most common type of attack on a website, which is the SQL injection attack.
Instructional Video9:06
Curated Video

A Detailed Guide to the OWASP Top 10 - Understanding SQL and Databases

Higher Ed
This video explains databases and Structured Query Language (SQL).
Instructional Video1:27
Curated Video

A Detailed Guide to the OWASP Top 10 - Quick Notice

Higher Ed
This video is a quick notice to SQL before diving into other attacks.