YoVDO

Learning the OWASP Top 10 (2018)

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Web Application Security Courses Software Vulnerabilities Courses OWASP Top 10 Courses Broken Access Control Courses Broken Authentication Courses

Course Description

Overview

Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).

Syllabus

Introduction
  • Welcome
  • OWASP and the OWASP Top 10
1. The Top 10
  • Injection
  • Broken authentication and session management
  • Sensitive data exposure
  • XML external entity (XXE)
  • Broken access control
  • Security misconfiguration
  • Cross-site scripting
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
Conclusion
  • Next steps

Taught by

Caroline Wong

Related Courses

Authentication & Authorization: OAuth
Udacity
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Hacking and Patching
University of Colorado System via Coursera
Fundamentals of Computer Network Security
University of Colorado System via Coursera