![]() |
Owasp: Software Or Data Integrity Failures
![]() Owasp: Software Or Data Integrity Failures Released 4/2026 By Alexander Tushinsky MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Level: Intermediate | Genre: eLearning | Language: English + subtitle | Duration: 1h 7m 1s | Size: 117 MB What you'll learn Modern applications are a collection of open-source libraries, third-party services, serialized data, and automated pipelines. Without integrity controls, any one of these components can be modified, replaced, or injected with malicious content, turning trusted software into an attack vector. Incidents like SolarWinds, Codecov, and the Equifax breach demonstrate the devastating consequences of integrity failures across code, data, and deployment processes. In this course, OWASP: Software or Data Integrity Failures, you'll learn how to identify and defend against integrity-related vulnerabilities across the software lifecycle. First, you'll explore how integrity failures occur, examining insecure deserialization, unverified auto-updates, and build-chain compromises that allow attackers to inject malicious code into trusted systems. Next, you'll discover how to implement integrity verification techniques, including checksums, digital signatures, code signing, and dependency management, to ensure only validated components enter your applications. |
| Часовой пояс GMT +3, время: 12:31. |
vBulletin® Version 3.6.8.
Copyright ©2000 - 2026, Jelsoft Enterprises Ltd.
Перевод: zCarot