Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
Description
Learn about the seventh and eighth categories of security vulnerabilities in the OWASP Top 10âcross-site scripting (XSS) and insecure deserialization.
Tags
Syllabus
Introduction
- Common software vulnerabilities
- General concept
- Example scenario 1
- Example scenario 2
- Enable a content security policy
- Apply context sensitive encoding
- Escape untrusted HTTP data
- General concept
- Example scenario 1
- Example scenario 2
- Use integrity checks and encrypt
- Log to detect insecure deserialization
- Isolate code that deserializes
- Next steps
Related Courses
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/7634ad0e8705.jpeg)
OWASP Top 10: #7 XSS and #8 Insecure Deserialization
Affiliate notice
-
TypeOnline Course
-
Provider
Learn about the seventh and eighth categories of security vulnerabilities in the OWASP Top 10âcross-site scripting (XSS) and insecure deserialization.
Introduction
- Common software vulnerabilities
- General concept
- Example scenario 1
- Example scenario 2
- Enable a content security policy
- Apply context sensitive encoding
- Escape untrusted HTTP data
- General concept
- Example scenario 1
- Example scenario 2
- Use integrity checks and encrypt
- Log to detect insecure deserialization
- Isolate code that deserializes
- Next steps
Loading...
Saving...
Loading...