Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Learning the OWASP Top 10

Description

Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).

Tags

Syllabus

Introduction
  • Welcome
  • OWASP and the OWASP Top 10
1. The Top 10
  • Injection
  • Broken authentication and session management
  • Sensitive data exposure
  • XML external entity (XXE)
  • Broken access control
  • Security misconfiguration
  • Cross-site scripting
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
Conclusion
  • Next steps

Online Course


Learning the OWASP Top 10

Affiliate notice

Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).

Introduction
  • Welcome
  • OWASP and the OWASP Top 10
1. The Top 10
  • Injection
  • Broken authentication and session management
  • Sensitive data exposure
  • XML external entity (XXE)
  • Broken access control
  • Security misconfiguration
  • Cross-site scripting
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
Conclusion
  • Next steps