Application Security Online Training Courses
Protect applications from security threats through robust practices. Study techniques for identifying vulnerabilities, implementing security measures, and conducting penetration testing. Ensure the integrity and safety of your software solutions.
1,011Results for "Application Security"
-
Complete Guide to Application Security7h 53m
Complete Guide to Application Security
By: Jerod Brennen
Course
-
API6:2019 mass assignment2m
API6:2019 mass assignment
From: The OWASP API Security Top 10: An Overview
Video
-
SSL Certificates for Web Developers1h 8m
SSL Certificates for Web Developers
By: Kevin Skoglund
Course
-
Learning the OWASP Top 10 (2025 Version)3h 14m
Learning the OWASP Top 10 (2025 Version)
By: Caroline Wong
Course
-
Dynamic Application Security Testing3h 24m
Dynamic Application Security Testing
By: Jerod Brennen
Course
-
A Bug Bounty Toolkit for Security Researchers2h 6m
A Bug Bounty Toolkit for Security Researchers
By: Bipin Gajbhiye
Course
-
Preventing improper output handling2m
Preventing improper output handling
From: The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview
Video
-
The OWASP API Security Top 10: An Overview41m
The OWASP API Security Top 10: An Overview
By: Davin Jackson
Course
-
Cybersecurity Foundations: Application Security46m
Cybersecurity Foundations: Application Security
By: Emmanuel Chebukati
Course
-
Defending against security misconfiguration5m
Defending against security misconfiguration
From: Learning the OWASP Top 10 (2025 Version)
Video
-
Example 1: Pwned Passwords3m
Example 1: Pwned Passwords
From: OWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures
Video
-
Defending against cryptographic failures5m
Defending against cryptographic failures
From: Learning the OWASP Top 10 (2025 Version)
Video
-
Broken access control "in the wild"4m
Broken access control "in the wild"
From: Learning the OWASP Top 10 (2025 Version)
Video
-
Intro video to course3m
Intro video to course
From: Advanced Practices in Application Security
Video
-
Defending against broken access control4m
Defending against broken access control
From: Learning the OWASP Top 10 (2025 Version)
Video
-
Supply Chain Cybersecurity: Preventing Supply Chain Attacks41m
Supply Chain Cybersecurity: Preventing Supply Chain Attacks
By: Nicole Dove
Course
-
Prevention techniques: Proper key management2m
Prevention techniques: Proper key management
From: OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures
Video