Introduction to application security
We walk through core security principles from the ground up that everyone involved in the development process should know. Expect real-world stories alongside concrete examples of problematic areas.
What you will learn:
- Why do we address application security?
- How do attackers think?
- OWASP Top 10 – the most common application vulnerabilities
- Logging and monitoring – what and when to log, and what to avoid
- Authentication and authorization – BFLA, BOLA, BOPLA, event-driven scenarios, centralization and least privilege
