Чему вы научитесь:
Объясните фундаментальный семантический сдвиг в сфере безопасности ИИ и почему традиционные инструменты и подходы к обеспечению безопасности имеют существенные недостатки при применении к системам ИИ.
Распознавать и классифицировать типы архитектур GenAI и оценивать...
[Linkedin] OWASP Top 10: #9 Security Logging and Monitoring Failures and #10 Server-Side Request Forgery, 2023 (Caroline Wong)
It’s important to protect your organization against security vulnerabilities, but how do you prepare for a possible attack? In this course, join instructor and...
caroline wong
components with known vulnerabilities
identity and access management
insufficient logging and monitoring
linkedin
monitoring failures
owasptop10
security
software development security
technology
[Linkedin] OWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures, 2023 (Caroline Wong)
Failures related to identity, authentication, and software and data integrity loom large in web application development. You need to keep security...
OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
Security vulnerabilities should be top of mind when it comes to safely accessing web applications within an organization. There’s always something that can go wrong if you’re not careful, but how do you prepare for a...
OWASP Top 10: #3 Injection and #4 Insecure Design
The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance software security. The OWASP Top 10 list describes the ten biggest vulnerabilities. In this course, Caroline...
OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures
No one is immune to security vulnerabilities when it comes to web applications. We all live with the looming possibility that something could go wrong in any instant. That’s why the Open Web Application Security Project...