Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Master the OWASP Top 10

Description

OWASP Top 10 describes the ten biggest software vulnerabilities. In this learning path, you can take a deep dive into each category, examining real-world examples that demonstrate how companies and consumers alike are affected, and learn techniques that can help you prevent these types of attacks.

  • Identify the vulnerabilities that make up the OWASP Top 10.
  • Learn how to prevent common software vulnerabilities.
  • Find out how to enhance software security.

Tags

Syllabus

  • Course 1: Learning the OWASP Top 10
    • Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
  • Course 2: OWASP Top 10: #1 Injection and #2 Broken Authentication
    • Get an overview of the top two software vulnerabilities—injection and broken authentication attacks—described in the OWASP Top 10.
  • Course 3: OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE)
    • Take a deep dive into the third and fourth categories of security vulnerabilities in the OWASP Top 10—sensitive data exposure and XML external entities (XXE).
  • Course 4: OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
    • Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.
  • Course 5: OWASP Top 10: #7 XSS and #8 Insecure Deserialization
    • Learn about the seventh and eighth categories of security vulnerabilities in the OWASP Top 10—cross-site scripting (XSS) and insecure deserialization.
  • Course 6: OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
    • Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.

Online Course


Master the OWASP Top 10

Affiliate notice

OWASP Top 10 describes the ten biggest software vulnerabilities. In this learning path, you can take a deep dive into each category, examining real-world examples that demonstrate how companies and consumers alike are affected, and learn techniques that can help you prevent these types of attacks.
  • Identify the vulnerabilities that make up the OWASP Top 10.
  • Learn how to prevent common software vulnerabilities.
  • Find out how to enhance software security.

  • Course 1: Learning the OWASP Top 10
    • Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
  • Course 2: OWASP Top 10: #1 Injection and #2 Broken Authentication
    • Get an overview of the top two software vulnerabilities—injection and broken authentication attacks—described in the OWASP Top 10.
  • Course 3: OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE)
    • Take a deep dive into the third and fourth categories of security vulnerabilities in the OWASP Top 10—sensitive data exposure and XML external entities (XXE).
  • Course 4: OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
    • Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.
  • Course 5: OWASP Top 10: #7 XSS and #8 Insecure Deserialization
    • Learn about the seventh and eighth categories of security vulnerabilities in the OWASP Top 10—cross-site scripting (XSS) and insecure deserialization.
  • Course 6: OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
    • Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.

Tags