YoVDO

Learning the OWASP Top 10 (2018)

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Web Application Security Courses Software Vulnerabilities Courses OWASP Top 10 Courses Broken Access Control Courses Broken Authentication Courses

Course Description

Overview

Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).

Syllabus

Introduction
  • Welcome
  • OWASP and the OWASP Top 10
1. The Top 10
  • Injection
  • Broken authentication and session management
  • Sensitive data exposure
  • XML external entity (XXE)
  • Broken access control
  • Security misconfiguration
  • Cross-site scripting
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
Conclusion
  • Next steps

Taught by

Caroline Wong

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera