Book Content
chapters • 10h48m total length
1. Secure Coding Fundamentals
2. Injection Flaws
3. Broken Authentication
4. Sensitive Data Exposure
5. XML External Entities
6. Broken Access Control
7. Security Misconfiguration
8. Cross-Site Scripting
9. Insecure Deserialization
10. Using components with known vulnerabilities
11. Insufficient Logging and Monitoring
12. Miscellaneous Vulnerabilities
13. Best Practices














