OWASP Top 10: A04:2021-Insecure Design
Todays web applications combine software code and resultant data with the trustworthiness of both resulting in a secure trusted application. There are many planning strategies and tools that can ensure software and data integrity. In this course explore IT supply chain security how to deploy Linux updates and how to configure a Windows Server Update Services (WSUS) host. Next examine object-oriented programming (OOP) and how it is related to insecure deserialization attacks. Finally learn how to use the OWASP Dependency-Check tool to verify that publicly disclosed vulnerabilities are not present in a projects dependencies. Upon completion youll be able to ensure that the design of a web application includes business requirements and related security controls.