OWASP Top 10 - The Making of the OWASP Top 10 and Beyond
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the creation process and underlying principles of the OWASP Top 10 in this informative 26-minute video presentation. Delve into the core principles, data collection methods, and challenges faced in compiling this crucial cybersecurity resource. Learn about managing likelihood, the importance of comprehensive data, and the intricacies of CVSS scoring. Gain insights into the (not so) secret formula used to determine the most critical web application security risks. Understand how the OWASP Foundation navigates through the complexities of data analysis to produce this invaluable guide for developers, security professionals, and organizations worldwide.
Syllabus
Intro
Core Principles
Start with the Data
It can be a little messy
Managing Likelihood
Need More Data
CVSS Scoring
Data Porridge
(Not so) Secret Formula
Taught by
OWASP Foundation
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network