Chevron Left
返回到 OWASP Top 10 - Risks 6-10

学生对 Infosec 提供的 OWASP Top 10 - Risks 6-10 的评价和反馈

4.6
61 个评分

课程概述

In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks....

热门审阅

MY

Dec 17, 2022

The teacher is so fluent in case of security and also teaches perfect

PF

Oct 5, 2022

V​ery useful, liked the tone of instructor and the resources, invaluable.

筛选依据:

1 - OWASP Top 10 - Risks 6-10 的 7 个评论(共 7 个)

创建者 Dev A

Jan 23, 2025

Easily understandable, thorough overview of the OWASP risks. Suitable for not deeply technical audience.

创建者 Pablo F

Oct 6, 2022

Very useful, liked the tone of instructor and the resources, invaluable.

创建者 Mohamad Y

Dec 18, 2022

The teacher is so fluent in case of security and also teaches perfect

创建者 Uriel N

Jul 1, 2025

Muy buen curso, completo y claro. Aunque aun no esta en espanol

创建者 Aaron S

Feb 20, 2023

Loved This Course

创建者 Syed M

Feb 25, 2025

Great!

创建者 Deleted A

Feb 26, 2025

PROS: the slides are good. They are good because they basically are a recap of OWASP documents. CONS: the course is dragging on without adding much value. The course has almost no code snippets, almost no concrete technical examples -- only storles. When the snippets are actually shown, they are presented with such gems of storytelling as "the idea is there is a frontend to the application, a frontend HTTP request that results in a backend API call that then returns the information. Because endpoints APIs are so common now in terms of building modern applications, this is a very common scenario". Thank you, I am an IT professional, I know that APIs are a thing. The lecturer recommends anti-patterns such as password rotation and gives a baffling advice to not put the full password into a password manager but leave out couple of symbols that need to be remembered. This is insane. And he says it twice, in two different videos. The quiz questions often make very little sense. They ask about details of the specific named attacks or the amount of time it took for an organisation to contain a data breach in 2019 (how is that important???). The questions are also left from the previous version of the course so sometimes they include information that was not in the course at all.