From the course: Application Security Testing and Debugging

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

OWASP code review tools workshop

OWASP code review tools workshop

Welcome to this video of Complete Vulnerability Assessment. Most security teams treat vulnerability scanning as the finish line when it's actually the starting line. They generate reports filled with unvalidated findings, false positives, and generic recommendations that development teams ignore and business leaders don't understand. Professional vulnerability assessment requires systematic workflows that validate technical findings, demonstrate real exploitability, and translate security flaws into business risk narratives that drive action. In this video, we will execute static analysis using IE integrated tools, integrate automated security scanning in CICD pipelines, perform dynamic testing with proxy-based tools, generate comprehensive vulnerability assessment reports. By the end of this video, you will be able to apply static analysis tools within development environments, integrate automated scanning and GitHub workflows, execute dynamic testing using OWAPS ZAP, generate…

Contents