An Introduction to OWASP Top 10 Vulnerabilities
Offered By: Udemy
Course Description
Overview
Learn the fundamentals of security
What you'll learn:
What you'll learn:
- Injection Vulnerabilities
- Broken Authentication
- Sensitive Data Exposure
- XML External Entities
- Broken Access Control
- Security Misconfiguration
- Cross-Site Scripting (XSS)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficent Logging and Monitoring
The purpose of this course is to provide students with a fundamental understanding of computer security, through the study of the top 10 most common security vulnerabilities, as provided by OWASP.
By the end of this course, students will have enough of an understanding to make design choices that preserve the security of the applications they own. This course can also serve as a way to gain foundations required to proceed to more advanced security topics.
Taught by
Scott Cosentino
Related Courses
Learning the OWASP Top 10LinkedIn Learning Master the OWASP Top 10
LinkedIn Learning OWASP Top 10: #1 Injection and #2 Broken Authentication
LinkedIn Learning OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
LinkedIn Learning Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals
EC-Council via FutureLearn