OWASP Top 10: A9 – Using Components with Known Vulnerabilities
Software developers often use existing third-party APIs and software components instead of recreating the wheel so to speak. This reduces development time and time to market for software products. In this course youll learn that only trusted APIs and components should be used that developers must truly understand how these items work and that they must be kept up-to-date. Next youll learn about the Heartbleed Bug and how to view components in Microsoft Visual Studio. Youll then examine how security must apply to all aspects of Continuous Integration and Continuous Delivery. Lastly youll explore how to search the shodan.io web site for vulnerable devices and apps.