5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Aspire     Web App Vulnerability Analyst     Web App Vulnerability Analyst Track 1: OWASP Top 10 Mitigations
Software developers often use existing third-party APIs and software components instead of recreating the wheel, so to speak. This reduces development time and time to market for software products. In this course, you'll learn that only trusted APIs and components should be used, that developers must truly understand how these items work, and that they must be kept up-to-date. Next, you'll learn about the Heartbleed Bug and how to view components in Microsoft Visual Studio. You'll then examine how security must apply to all aspects of Continuous Integration and Continuous Delivery. Lastly, you'll explore how to search the shodan.io web site for vulnerable devices and apps.

Objectives

OWASP Top 10: A9 - Using Components with Known Vulnerabilities

  • discover the key concepts covered in this course
  • identify how software developers commonly use third-party APIs and components
  • describe how the Heartbleed Bug compromises older versions of OpenSSL
  • recognize how security must be integrated into all aspects of Continuous Integration and Continuous Delivery (CI/CD)
  • browse vulnerable devices on the Shodan.io web site
  • summarize the key concepts covered in this course