OWASP A7 - Cross-Site Scripting (XSS)
Using Components with Known Vulnerabilities
This module discusses use of components with known vulnerabilities (such as libraries and frameworks) that may undermine application defenses and enable various attacks.
This module covers best practices for serialization - the process of turning data objects into binary streams of data.
OWASP A10 - Insufficient Logging and Monitoring
This module covers insufficient logging and monitoring.
Infosec Named a Leader in 2019 Gartner Magic Quadrant
Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.