Learning the OWASP Top 10 (2018)
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
Syllabus
Introduction
- Welcome
- OWASP and the OWASP Top 10
- Injection
- Broken authentication and session management
- Sensitive data exposure
- XML external entity (XXE)
- Broken access control
- Security misconfiguration
- Cross-site scripting
- Insecure deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
- Next steps
Taught by
Caroline Wong
Related Courses
Learning the OWASP Top 10LinkedIn Learning OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
LinkedIn Learning Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals
EC-Council via FutureLearn Pentesting with Daniel Slater (Ethical Hacking/Web Security)
Udemy OWASP Top 10: API Security Playbook
Pluralsight