YoVDO

Learning the OWASP Top 10 (2018)

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Web Application Security Courses Software Vulnerabilities Courses OWASP Top 10 Courses Broken Access Control Courses Broken Authentication Courses

Course Description

Overview

Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).

Syllabus

Introduction
  • Welcome
  • OWASP and the OWASP Top 10
1. The Top 10
  • Injection
  • Broken authentication and session management
  • Sensitive data exposure
  • XML external entity (XXE)
  • Broken access control
  • Security misconfiguration
  • Cross-site scripting
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
Conclusion
  • Next steps

Taught by

Caroline Wong

Related Courses

Information Security - 5 - Secure Systems Engineering
Indian Institute of Technology Madras via Swayam
Reverse Engineering and Exploit Development
Udemy
Master the OWASP Top 10
LinkedIn Learning
CASP+ Cert Prep: 2 Enterprise Security Architecture
LinkedIn Learning
Learning the OWASP Top 10
LinkedIn Learning