Meet Our Experts
Robert Hurlbut
Webinars
Is Your Website Really Secure?
The OWASP consortium spent most of 2017 re-evaluating the OWASP Top 10 list to insure the top internet threats are still relevant today. After much debating, the group released the new list which includes new threats. Don’t become a casualty b...
OWASP: The Next Generation
Throughout 2017, the members of the OWASP consortium spent countless days and months formulating the new OWASP Top 10 list. This is a list if the top ten exploits and security threats for web applications along with what developers, IT professionals,...
Courses
OWASP Top 10 2021 Part 4
In this course, the student will get an overview of the OWASP Top 10 2021. The OWASP® (“Open Worldwide Application Security Project”) Foundation first published the OWASP Top 10 list in 2003. Since then, the list has been updated in 2004, 2007, 2010,...
OWASP Top 10 2021 Part 3
In this course, the student will get an overview of the OWASP Top 10 2021. The OWASP® (“Open Worldwide Application Security Project”) Foundation first published the OWASP Top 10 list in 2003. Since then, the list has been updated in 2004, 2007, 2010,...
OWASP Top 10 2021 Part 2
In this course, the student will get an overview of the OWASP Top 10 2021. The OWASP® (“Open Worldwide Application Security Project”) Foundation first published the OWASP Top 10 list in 2003. Since then, the list has been updated in 2004, 2007, 2010,...
OWASP Top 10 2021 Part 1
In this course, the student will get an overview of the OWASP Top 10 2021. The OWASP® (“Open Worldwide Application Security Project”) Foundation first published the OWASP Top 10 list in 2003. Since then, the list has been updated in 2004, 2007, 2010,...
OWASP Top 10 2017 Update
The Open Web Application Security Project focuses on improving the security of software .The OWASP Top 10 is a powerful awareness document for web application security and represents a broad consensus about the most critical security risks to web app...
OWASP Proactive Controls, Part 2 of 2: Controls 6 through 10
In this course, you will learn about the OWASP Top 10 Proactive Controls document and the many guidelines it provides to help developers write better and more secure code. In particular, I will cover the last five controls. These include implementing...
OWASP Proactive Controls, Part 1 of 2: Controls 1 through 5
In this course, you will learn about the OWASP Top 10 Proactive Controls document and the many guidelines it provides to help developers write better and more secure code. In particular, I provide an overview of the Proactive Controls and then I cove...