OWASP Top 10: A06:2021-Vulnerable & Outdated Components

placeholder

Software developers often use existing third-party APIs and software components. This reduces development time and the time to market for software products. In this course learn about trusted APIs and components including when they are used how developers must truly understand how these items work and how they must be kept up to date. Next examine the Heartbleed Bug and how to view components in Microsoft Visual Studio. Finally discover how security must apply to all aspects of continuous integration and continuous delivery (CI/CD) and learn how to search the Shodan website for vulnerable devices and apps. Upon completion youll be able to recognize the importance of using only trusted third-party APIs and software components during application development.