Learning the OWASP Top 10 (2018)
Offered By: LinkedIn Learning
Course Description
Overview
Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
Syllabus
Introduction
- Welcome
- OWASP and the OWASP Top 10
- Injection
- Broken authentication and session management
- Sensitive data exposure
- XML external entity (XXE)
- Broken access control
- Security misconfiguration
- Cross-site scripting
- Insecure deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
- Next steps
Taught by
Caroline Wong
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network