logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts
Exploring the OWASP Top Ten for AI
COST: $1995

08/05/24 | 10:00am - 6:00pm Virtual-Instructor Led
08/06/24 | 10:00am - 6:00pm Virtual-Instructor Led
Sign-In

Email

Password      Forgot your password?

BILLING INFORMATION
 (Zip code must match the cardholder billing address)  
First Name          Last Name
 
Organization* (Please use your name if no Organization)

Address

City                     State     Zip
   
Card Number

Month   Year          Verification Code
     
-or- Pay By PO

New to System Source?


(You will be brought back once your account is created)
Or Call (410)771-5544 x5

OWASP 2021 refers to the latest edition of the Open Web Application Security Project (OWASP) Top Ten list, which identifies the most critical web application security risks. It is a valuable resource as it provides organizations with insights into prevalent vulnerabilities, helping them prioritize their security efforts and fortify their applications against potential attacks.

Applying AI to the OWASP Top Ten is a two-day, expert led course geared for technical students eager to explore AI's potency in mitigating cybersecurity threats. This course unravels the intersection of AI, cybersecurity, and ethical considerations with a focus on the OWASP top ten. The curriculum provides a detailed exploration of OWASP's top ten security risks, illustrating how AI can be effectively applied to detect and mitigate these common threats, such as Injection and Broken Authentication.

Through engaging discussions, interactive activities, and case study reviews, attendees will delve into the practical application of sophisticated AI algorithms to counter prevalent OWASP risks. The course encompasses an array of OWASP-related topics including how to leverage AI to manage risks associated with Insufficient Logging & Monitoring and Using Components with Known Vulnerabilities, as well as how to prevent Cross-Site Scripting (XSS) and Insecure Deserialization through the power of AI. Emphasizing the importance of testing, validating, and fine-tuning AI models, the course provides a comprehensive understanding of these tools' robustness and effectiveness in addressing OWASP risks. Integrating technical skills with ethical considerations, attendees will learn about designing and implementing AI models that adhere to ethical standards while effectively detecting and mitigating OWASP risks.