Application security

Application security
When you properly secure your software system and then can prove it, you obtain a competitive advantage that helps you earn trust and win sales.

March 16, 2022
Ted Harrington
Application security
By understanding the methodology’s three primary flaws, you and your security team can be more effective in protecting your company’s assets.

March 09, 2022
Ted Harrington
Application security
Bug bounty programs don’t replace the need for a security consulting company that you work directly with for your security testing program.

March 02, 2022
Ted Harrington
Application security
To beat hackers at their own game, you need to think like them.

February 23, 2022
Ted Harrington
Application security
Learn best practices for authorization in Laravel, such as only authorizing against permissions, not roles.

February 11, 2022
Aaron Saray
Application security
Learn the right way to do security from the guy who literally wrote the book on the subject — best-selling author and cybersecurity expert Ted Harrington.

February 09, 2022
Patrick McSweeney
Application security
Learn how to use Laravel in authorization to your application.

February 09, 2022
Aaron Saray
Application security
Security is an ongoing process: you’ll need to regularly reassess your system for vulnerabilities.

February 09, 2022
Ted Harrington
Application security
Take a look at the difference between authentication and authorization and what works best for you.

February 07, 2022
Aaron Saray
Application security
You want a system in place to grade severity so you know where to focus your efforts, and in what order.

February 02, 2022
Ted HarringtonLearn how to secure systems with 11 courses from Infosec Skills instructor and #1 best-selling author Ted Harrington.
- Hack your system
- Establish your threat model
- Spend wisely
- And more
In this Series
- DevSecOps: Moving from “shift left” to “born left”
- What’s new in the OWASP Top 10 for 2023?
- DevSecOps: Continuous Integration Continuous Delivery (CI-CD) tools
- Introduction to DevSecOps and its evolution and statistics
- MongoDB (part 3): How to secure data
- MongoDB (part 2): How to manage data using CRUD operations
- MongoDB (part 1): How to design a schemaless, NoSQL database
- Understanding the DevSecOps Pipeline
- API Security: How to take a layered approach to protect your data
- How to find the perfect security partner for your company
- Security gives your company a competitive advantage
- 3 major flaws of the black-box approach to security testing
- Can bug bounty programs replace dedicated security testing?
- The 7 steps of ethical hacking
- Laravel authorization best practices and tips
- Learn how to do application security right in your organization
- How to use authorization in Laravel: Gates, policies, roles and permissions
- Is your company testing security often enough?
- Authentication vs. authorization: Which one should you use, and when?
- Why your company should prioritize security vulnerabilities by severity
- There’s no such thing as “done” with application security
- Understanding hackers: The insider threat
- Understanding hackers: The 5 primary types of external attackers
- Want to improve the security of your application? Think like a hacker
- 5 problems with securing applications
- Why you should build security into your system, rather than bolt it on
- Why a skills shortage is one of the biggest security challenges for companies
- How should your company think about investing in security?
- How to carry out a watering hole attack: Examples and video walkthrough
- How cross-site scripting attacks work: Examples and video walkthrough
- How SQL injection attacks work: Examples and video walkthrough
- Securing the Kubernetes cluster
- How to run a software composition analysis tool
- How to run a SAST (static application security test): tips & tools
- How to run an interactive application security test (IAST): Tips & tools
- How to run a dynamic application security test (DAST): Tips & tools
- Introduction to Kubernetes security
- Key findings from ESG’s Modern Application Development Security report
- Microsoft’s Project OneFuzz Framework with Azure: Overview and concerns
- Software maturity models for AppSec initiatives
- Best free and open source SQL injection tools [updated 2021]
- Pysa 101: Overview of Facebook’s open-source Python code analysis tool
- Improving web application security with purple teams
- Open-source application security flaws: What you should know and how to spot them
- Android app security: Over 12,000 popular Android apps contain undocumented backdoors
- 13 common web app vulnerabilities not included in the OWASP Top 10
- Fuzzing, security testing and tips for a career in AppSec
- 14 best open-source web application vulnerability scanners [updated for 2020]
- 6 ways to address the OWASP top 10 vulnerabilities
- Ways to protect your mobile applications against hacking
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!