YoVDO

Learning the OWASP Top 10 (2018)

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Web Application Security Courses Software Vulnerabilities Courses OWASP Top 10 Courses Broken Access Control Courses Broken Authentication Courses

Course Description

Overview

Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).

Syllabus

Introduction
  • Welcome
  • OWASP and the OWASP Top 10
1. The Top 10
  • Injection
  • Broken authentication and session management
  • Sensitive data exposure
  • XML external entity (XXE)
  • Broken access control
  • Security misconfiguration
  • Cross-site scripting
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
Conclusion
  • Next steps

Taught by

Caroline Wong

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network