Close
Training
CMD+CTRL Base Camp
NEW!
SI-CSC Certifications
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Guides & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Ed TALKS
We’re Hiring
Blog
Course Catalog
Ed TALKS
We’re Hiring
Blog
Course Catalog
Training
CMD+CTRL Base Camp
NEW!
SI-CSC Certifications
Courses
Overview
Features
Learning Paths
Course Catalog
Customer Success
Try it
Labs
Cyber Range
Overview
Environments & Modes
Reporting
Customer Success
Get Started
Try it
|
Lab Journey series
Try it
|
Take the AppSec Challenge
Services
Overview
Software Penetration Testing
IoT Pen Testing
Mobile Pen Testing
Cloud & Web Penetration Testing
Blockchain Pen Testing
Our Difference
Application Security Consulting
Secure SDLC (SSDLC) Consulting
Application Security Code Review
Architecture & Design Review
Medical Device Threat Modeling
Infrastructure Security Consulting
Attack Simulation
Cloud Security Configuration
Security Tabletop Consulting
Solutions
Cloud & Web
Mobile
IoT & Embedded
Blockchain
Resources
Guides & Case Studies
Webinars
About Us
Company Overview
20 Years of Innovation
Closing the Skills Gap
Diversity, Equity & Inclusion
Clients
Leadership
Careers
News & Events
Contact
Let’s Talk
Course Catalog
/
Subject
/
owasp-asvs
owasp-asvs
View All Courses
Download Course Catalog
LAB 324 ATT&CK: Exploiting Java Web Application Server Misconfiguration
12 Minutes
EliteElective
LAB 323 ATT&CK: Exploiting Vulnerable Java Web Application Server Software
12 Minutes
EliteElective
LAB 315 ATT&CK: Updating Vulnerable Java Web Application Server Software
12 Minutes
EliteElective
LAB 244 – Defending Java Applications Against Security Misconfiguration
12 Minutes
Advanced
LAB 242 – Defending Node.js Applications Against eXternal XML Entity (XXE) Vulnerabilities
10 Minutes
Advanced
LAB 241 – Defending C# Applications Against eXternal XML Entity (XXE) Vulnerabilities
10 Minutes
Advanced
LAB 240 – Defending Java Applications Against eXternal XML Entity (XXE) Vulnerabilities
10 Minutes
Advanced
LAB 223 – Defending Node.js Applications Against SQL Injection
10 Minutes
Advanced
LAB 222 – Defending Python Applications Against SQL Injection
10 Minutes
Advanced
LAB 221 – Defending C# Applications Against SQL Injection
10 Minutes
Advanced
LAB 113 – Identifying Cryptographic Failures
5 Minutes
Advanced
LAB 330 ATT&CK: Exploiting Java SQL Injection to Extract Password Hashes
15 Minutes
EliteElective
LAB 322 ATT&CK: Exploiting Windows File Sharing Server with External Remote Services
20 Minutes
EliteElective
LAB 321 ATT&CK: Password Cracking
5 Minutes
EliteElective
LAB 237 – Defending Java Applications Against SQL Injection
20 Minutes
Advanced
LAB 233 – Defending Node.js Applications Against XSS
15 Minutes
Advanced
LAB 232 – Defending C# Applications Against XSS
15 Minutes
Advanced
LAB 231 – Defending Python Applications Against XSS
15 Minutes
Advanced
LAB 230 – Defending Java Applications Against XSS
15 Minutes
Advanced
LAB 220 – Defending Against Hard-Coded Secrets
5 Minutes
Advanced
LAB 120 – Identifying XML Injection
5 Minutes
Core
LAB 119 – Identifying Persistent XSS
5 Minutes
Advanced
LAB 118 – Identifying Weak File Upload Validation
5 Minutes
AdvancedElective
LAB 117 – Identifying Hidden Form Field
5 Minutes
AdvancedElective
LAB 116 – Identifying Forceful Browsing
5 Minutes
AdvancedElective
LAB 115 – Identifying Reflective XSS
5 Minutes
Advanced
LAB 114 – Identifying Cookie Tampering
5 Minutes
AdvancedElective
LAB 110 – Identifying Sensitive Data Exposure Vulnerability Identification
7 Minutes
Advanced
LAB 109 – Identifying Security Misconfiguration Vulnerabilities
5 Minutes
Advanced
LAB 108 – Identifying Reverse Engineering Vulnerabilities
8 Minutes
AdvancedElective
LAB 107 – Identifying Injection Vulnerabilities
7 Minutes
Advanced
LAB 106 – Identifying Cross-Site Scripting Vulnerabilities
7 Minutes
Advanced
LAB 105 – Identifying Credential Dumping: Vulnerability Identification
7 Minutes
AdvancedElective
LAB 103 – Identifying Broken User Authentication Vulnerabilities
7 Minutes
Advanced
LAB 102 – Identifying Broken Object-Level Authorization Vulnerabilities
5 Minutes
AdvancedElective
LAB 101 – Identifying Broken Access Control Vulnerabilities
5 Minutes
Advanced
SDT 325 – Testing for NULL Pointer Dereference
10 Minutes
Elite
SDT 324 – Testing for Improper Restriction of Operations within the Bounds of a Memory Buffer
10 Minutes
Elite
SDT 323 – Testing for Improper Input Validation
10 Minutes
Elite
SDT 322 – Testing for Improper Privilege Management
10 Minutes
Elite
SDT 321 – Testing for Uncontrolled Resource Consumption
10 Minutes
Elite
SDT 320 – Testing for Out-of-bounds Write
10 Minutes
Elite
SDT 319 – Testing for Out-of-bounds Read
10 Minutes
Elite
SDT 318 – Testing for Insufficiently Protected Credentials
10 Minutes
Elite
SDT 317 – Testing for Improper Control of Generation of Code
10 Minutes
Elite
SDT 326 – Testing for Use After Free
10 Minutes
Elite
TST 206 – ASVS Requirements for Developers
20 Minutes
Advanced