Master the OWASP Top 10
Offered By: LinkedIn Learning
Course Description
Overview
OWASP Top 10 describes the ten biggest software vulnerabilities. In this learning path, you can take a deep dive into each category, examining real-world examples that demonstrate how companies and consumers alike are affected, and learn techniques that can help you prevent these types of attacks.
- Identify the vulnerabilities that make up the OWASP Top 10.
- Learn how to prevent common software vulnerabilities.
- Find out how to enhance software security.
Syllabus
- Course 1: Learning the OWASP Top 10
- Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
- Course 2: OWASP Top 10: #1 Injection and #2 Broken Authentication
- Get an overview of the top two software vulnerabilities—injection and broken authentication attacks—described in the OWASP Top 10.
- Course 3: OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE)
- Take a deep dive into the third and fourth categories of security vulnerabilities in the OWASP Top 10—sensitive data exposure and XML external entities (XXE).
- Course 4: OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
- Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.
- Course 5: OWASP Top 10: #7 XSS and #8 Insecure Deserialization
- Learn about the seventh and eighth categories of security vulnerabilities in the OWASP Top 10—cross-site scripting (XSS) and insecure deserialization.
- Course 6: OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
- Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.
Taught by
Caroline Wong, Caroline Wong, Caroline Wong, Caroline Wong, Caroline Wong and Caroline Wong
Related Courses
Information Security - 5 - Secure Systems EngineeringIndian Institute of Technology Madras via Swayam Reverse Engineering and Exploit Development
Udemy CASP+ Cert Prep: 2 Enterprise Security Architecture
LinkedIn Learning Learning the OWASP Top 10 (2018)
LinkedIn Learning Learning the OWASP Top 10
LinkedIn Learning