Learning the OWASP Top 10 (2018)
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
Syllabus
Introduction
- Welcome
- OWASP and the OWASP Top 10
- Injection
- Broken authentication and session management
- Sensitive data exposure
- XML external entity (XXE)
- Broken access control
- Security misconfiguration
- Cross-site scripting
- Insecure deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
- Next steps
Taught by
Caroline Wong
Related Courses
Authentication & Authorization: OAuthUdacity Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Hacking and Patching
University of Colorado System via Coursera Fundamentals of Computer Network Security
University of Colorado System via Coursera