Great video, brother. I am currently studying for the CompTIA Security+ certification and I am conducting a lot of self-study on the various concepts in the exam objectives. Videos like this give me such a great insight and understanding on some of these concepts, and you delivered it in a such a way that is easily understandable and memorable, which is exactly what I am looking for. Thanks :).
Thanks for the info! I'm also prepping for interview! You have a few typos in the slides ( Pseudo, likelihood...) and wanted to confirm that OWASP 08 includes "deserialization" or deserialisation, NOT desterilization. I want to make sure that it is right!
The topic "injectiojn" is far more than just XSS! Even though the other information could be right and useful, this is an understatement and leaves out any mentioning of the other injection methods which are part of the topic. It's far more than just XSS.
Thanks for the comment, the way we classify injection is into two categories, server side injection and client side. It is a broad category which indeed includes many attack vectors. We intend to do a more detail video in the next few months.
I worked as Java developer for 1 year (i feel like I am still a baby in java ). I recently hired as Java Remediation(apps - cybersecurity). I encounter various type of vulnerabilities in apps, is there any other resources to look in that helps in remediating vulnerabilities? Is there a link for it OWASP ?
Watching it before my interview wish me luck
Hope it helped!
@@CyberCitadel not kidding I got the job
👏🥳
@@thealienatedfreak9538 congrats mate!
Hahahaha same situation here! Tomorow is my pentester interview so I'm running thru aaall the meat and potatos and bread and butter there is 😂
Great video, brother. I am currently studying for the CompTIA Security+ certification and I am conducting a lot of self-study on the various concepts in the exam objectives. Videos like this give me such a great insight and understanding on some of these concepts, and you delivered it in a such a way that is easily understandable and memorable, which is exactly what I am looking for. Thanks :).
You can do it!
Your videos are immensely informative and high-quality. I look forward to watching more of your content. Thank you so much for this, keep it up!
Thank you. More to come in 2022 so stay on the look out!
Just randomly clicked on your video. Best explanation and presentation on OWASP Top 10 I've seen. Keep up the great work! Subscribed!
Many thanks! Another round of explainer, interview and case study videos coming soon, so stay tuned!
amazing editing skills. You have great videos, very helpful.
Glad you have found the video useful. Subscribe to stay tuned for more!
Great video! Its important to clarify these lists.
Glad it was useful!
Thanks for the info! I'm also prepping for interview! You have a few typos in the slides ( Pseudo, likelihood...) and wanted to confirm that OWASP 08 includes "deserialization" or deserialisation, NOT desterilization. I want to make sure that it is right!
Great Video , so much helpful info , many thanks !
Thank you for your support! Watch out for our next video on MITRE ATT&CK coming soon!
Great video provided exactly the overview I needed for my team.
The topic "injectiojn" is far more than just XSS! Even though the other information could be right and useful, this is an understatement and leaves out any mentioning of the other injection methods which are part of the topic. It's far more than just XSS.
Thanks for the comment, the way we classify injection is into two categories, server side injection and client side. It is a broad category which indeed includes many attack vectors. We intend to do a more detail video in the next few months.
Watching it before my presentation, wish me luck!
Best of luck!
Thanks great info and great format
Stay tuned for more explainer, interview and case study videos coming soon. If there is anything you want us to explore then let us know!
Gr8 video my guy.
Glad you enjoyed
Great video! thank you
Glad you liked it! Stay tuned for more videos to come.
Best video ever
🙌🙏
Great video.
Thank you! Watch out for our OWASP vs. Cyber Citadel Top 10 comparison.
top demais cara !
OWASP Top 10 isn’t a standard. OWASP ASVS is the standard.
That is correct. However, the Top 10 is used as a standard awareness document by many.
I worked as Java developer for 1 year (i feel like I am still a baby in java ). I recently hired as Java Remediation(apps - cybersecurity). I encounter various type of vulnerabilities in apps, is there any other resources to look in that helps in remediating vulnerabilities? Is there a link for it OWASP ?
Lyda Landing
Injection == xss? No.
8674 London Centers
The risk is real
Fb Gooble Twitter Instagram ect.
Lol.