Learning the OWASP Top 10 (2018)
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
Syllabus
Introduction
- Welcome
- OWASP and the OWASP Top 10
- Injection
- Broken authentication and session management
- Sensitive data exposure
- XML external entity (XXE)
- Broken access control
- Security misconfiguration
- Cross-site scripting
- Insecure deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
- Next steps
Taught by
Caroline Wong
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera