YoVDO

An Introduction to OWASP Top 10 Vulnerabilities

Offered By: Udemy

Tags

Cybersecurity Courses Computer Security Courses Injection Vulnerabilities Courses Broken Access Control Courses Broken Authentication Courses Insecure Deserialization Courses

Course Description

Overview

Learn the fundamentals of security

What you'll learn:
  • Injection Vulnerabilities
  • Broken Authentication
  • Sensitive Data Exposure
  • XML External Entities
  • Broken Access Control
  • Security Misconfiguration
  • Cross-Site Scripting (XSS)
  • Insecure Deserialization
  • Using Components with Known Vulnerabilities
  • Insufficent Logging and Monitoring

The purpose of this course is to provide students with a fundamental understanding of computer security, through the study of the top 10 most common security vulnerabilities, as provided by OWASP.

By the end of this course, students will have enough of an understanding to make design choices that preserve the security of the applications they own. This course can also serve as a way to gain foundations required to proceed to more advanced security topics.


Taught by

Scott Cosentino

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network