Spot the OWASP top 10 vulnerabilities!

Any penetration testers going to work within an organization need to follow the Top 10 to ensure application security and minimize the risks to the organization. This course is going to do the same in the practical scenario of how you can test for OWASP Top 10 vulnerabilities in more effective ways.

The course covers:
Broken access control – Cryptographic failures – Injection description – Insecure design – Security misconfigurations – Vulnerable and outdated components – Identification and authentication failures – Software and data integrity failures – Security logging and monitoring – Server-side request forgery

Gabriele Bondo OfficialNew

When PT in ChatGPT refers to Penetration Testing

Reconnaissance and scanning A word of caution: this article makes considerable use of concepts such as Sarcasm and Irony. If …

Apr 20,2023

18 min read

Aditya Kattimani OfficialNew

Hashcat: A Beginner's Guide

Disclaimer: This is intended to be used solely for ethical purposes. Please make sure you don't try the below-discussed methods …

Apr 18,2023

10 min read

Robert.Searcy OfficialNew

Impact of Artificial Intelligence on Cybersecurity

Impact of Artificial Intelligence on Cybersecurity Current advances in Artificial Intelligence (AI) are widely impacting the cybersecurity industry. Companies are …

Apr 17,2023

6 min read

Hacking Blockchain based APIs (W69)

Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.

Mar 11,2023

5 min read

Abhinav Porwal OfficialNew

Insider Threats: The Hidden Danger Within Your Organization and How to Safeguard Against Them

In today's digital age, information is power. With the increasing use of technology and the internet in the workplace, organizations …

Apr 17,2023

5 min read

Gabriele Bondo OfficialNew

When PT in ChatGPT refers to Penetration Testing

Reconnaissance and scanning A word of caution: this article makes considerable use of concepts such as Sarcasm and Irony. If …

Apr 20,2023

18 min read

Aditya Kattimani OfficialNew

Hashcat: A Beginner's Guide

Disclaimer: This is intended to be used solely for ethical purposes. Please make sure you don't try the below-discussed methods …

Apr 18,2023

10 min read

Robert.Searcy OfficialNew

Impact of Artificial Intelligence on Cybersecurity

Impact of Artificial Intelligence on Cybersecurity Current advances in Artificial Intelligence (AI) are widely impacting the cybersecurity industry. Companies are …

Apr 17,2023

6 min read

Abhinav Porwal OfficialNew

Insider Threats: The Hidden Danger Within Your Organization and How to Safeguard Against Them

In today's digital age, information is power. With the increasing use of technology and the internet in the workplace, organizations …

Apr 17,2023

5 min read

Hacking Blockchain based APIs (W69)

Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.

Mar 11,2023

9 min read

Penetration testing OWASP Top 10 Vulnerabilities (W68)

OWASP Top 10 is the standard awareness for web application security and developers; it covers a broad area of most critical security risks to web application security. Almost every company adopts OWASP Top 10 approach to secure web applications and minimize the risks. Any penetration testers going to work within an organization need to follow the Top 10 to ensure application security and minimize the risks to the organization. This course is going to do the same in the practical scenario of how you can test for OWASP Top 10 vulnerabilities in more effective ways.

Mar 08,2023

15 min read

IoT Security - the DVID Challenge - NEW EDITION (W67)

IoT is a growing market and will be the future of our daily lives. Because of its emergence, there is no standard to steward the development process but many protocols and custom solutions to connect hardware to a cloud. Sometimes, a middleware (like smartphone application) could be encountered between hardware and cloud.

Mar 07,2023

27 min read

OSINT Fundamentals (W66)

This course focuses on Open-Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they are interested in: *Gaining a better understanding of OSINT techniques *Improving investigative skill set *Improving overall research methodology *Improving personal OPSEC OSINT is one of the key skills required for both Red and Blue Team jobs - if you want to put these skills in your resume with confidence, this course will help!

Aug 23,2022

11 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
Hakin9 - IT Security Magazine

Watch the rest of this video with a free account.

Already have an account? Sign in