HOME > IT & Software > Website Security- ASP.NET Web Cybersecurity, OWASP Top 10+

Website Security- ASP.NET Web Cybersecurity, OWASP Top 10+

SynopsisWebsite Security: ASP.NET Web Cybersecurity, OWASP Top 10+, a...
Website Security- ASP.NET Web Cybersecurity, OWASP Top 10+  No.1

Website Security: ASP.NET Web Cybersecurity, OWASP Top 10+, available at $64.99, has an average rating of 3.9, with 28 lectures, based on 91 reviews, and has 344 subscribers.

You will learn about Identify and correct web application vulnerabilities in ASP .Net Applications Learn best practices for secure by default web applications using ASP,Net core Understand common vulnerabilities such as the OWASP Top 10 Step inside the mind of the attacker to understand their techniques This course is ideal for individuals who are ASP Net Developers or C# Developers It is particularly useful for ASP Net Developers or C# Developers.

Enroll now: Website Security: ASP.NET Web Cybersecurity, OWASP Top 10+

Summary

Title: Website Security: ASP.NET Web Cybersecurity, OWASP Top 10+

Price: $64.99

Average Rating: 3.9

Number of Lectures: 28

Number of Published Lectures: 28

Number of Curriculum Items: 29

Number of Published Curriculum Objects: 29

Original Price: $19.99

Quality Status: approved

Status: Live

What You Will Learn

  • Identify and correct web application vulnerabilities in ASP .Net Applications
  • Learn best practices for secure by default web applications using ASP,Net core
  • Understand common vulnerabilities such as the OWASP Top 10
  • Step inside the mind of the attacker to understand their techniques
  • Who Should Attend

  • ASP Net Developers
  • C# Developers
  • Target Audiences

  • ASP Net Developers
  • C# Developers
  • Every day we hear news of yet another breach of  some organization’s data.  Many of these result in huge costs to the organization, some have even  gone out of business as a result.  The Payment Card Industry (PCI) as well as many other international and local regulations require some level of security awareness for developers.  This course was designed specifically to increase the awareness of security flaws in code.

    Why choose this course?  Microsoft uses Chuck’s courses to train their developers internally.  Chuck’s courses have been delivered to thousands of developers in-person, online and via Udemy, including  major corporations, government agencies and military around the world.

    Students will learn the OWASP top 10 as well as software engineering practices that lead to a more secure development work product through many hands-on exercises complete with instruction and source code.

  • Security in the software development lifecycle

  • Injection Flaws– SQL Injection, XPath Injection, cmd Injection and more

  • Broken Authentication – learn to use Identity to avoid authentication flaws

  • XML External Entities

  • Sensitive Data Exposure

  • Security Misconfiguration

  • Broken Access Control – prevent direct object references

  • Cross Site Scripting

  • Insecure object deserialization

  • Using components with known vulnerabilities

  • Insufficient Logging and Monitoring

  • Other issues – CSRF, Validation

  • Securing the business tier

  • Secure by default

    Learn to build applications that are secure by default.  Following the best practices of software development not only provides great results in a cost efficient way, but also enhances the security posture of the application.  Hands-on labs demonstrate these concepts.

    This course has been presented to thousands of developers over the last 2 decades with great success.  Evolving the course to keep up with todays challenges and technologies is a primary goal for us.  Join expert developer Chuck McCullough for this course on web security.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Lecture 2: Installing Visual Studio

    Lecture 3: Progress Report

    Lecture 4: Hands-On Lab – Acme Bank

    Chapter 2: OWASP Top 10

    Lecture 1: Introduction

    Lecture 2: Injection Flaws

    Lecture 3: Hands-On Lab – Injection Flaws

    Lecture 4: Broken Authentication

    Lecture 5: Hands-On Lab – Broken Authentication – Part 1

    Lecture 6: Hands-On Lab – Broken Authentication – Part 2

    Lecture 7: Hands-On Lab – Broken Authentication – Part 3

    Lecture 8: XML External Entities

    Lecture 9: Hands-On Lab – XXE

    Lecture 10: Sensitive Data Exposure

    Lecture 11: Security Misconfiguration

    Lecture 12: Broken Access Control

    Lecture 13: Hands-On Lab – Broken Access Control

    Lecture 14: Cross Site Scripting

    Lecture 15: Hands-On Lab – Cross Site Scripting

    Lecture 16: Insecure Deserialization

    Lecture 17: Using Components with Known Vulnerabilities

    Lecture 18: Insufficient Logging & Monitoring

    Chapter 3: Secure By Default

    Lecture 1: Introduction

    Lecture 2: Object-Oriented & Test Driven Design

    Lecture 3: Defensive Coding

    Lecture 4: Entity Framework

    Lecture 5: Design Patterns & Principles

    Lecture 6: Hands-On Lab – Final Touches

    Instructors

  • Website Security- ASP.NET Web Cybersecurity, OWASP Top 10+  No.2
    Chuck McCullough
    Software Engineer
  • Rating Distribution

  • 1 stars: 2 votes
  • 2 stars: 2 votes
  • 3 stars: 22 votes
  • 4 stars: 32 votes
  • 5 stars: 33 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!