- Identify the vulnerabilities that make up the OWASP Top 10.
- Learn how to prevent common software vulnerabilities.
- Find out how to enhance software security.
Overview
OWASP Top 10 describes the ten biggest software vulnerabilities. In this learning path, you can take a deep dive into each category, examining real-world examples that demonstrate how companies and consumers alike are affected, and learn techniques that can help you prevent these types of attacks.
Syllabus
Courses under this program:
Course 1: Learning the OWASP Top 10 (2018)
-Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
Course 2: OWASP Top 10: #1 Injection and #2 Broken Authentication
-Get an overview of the top two software vulnerabilities—injection and broken authentication attacks—described in the OWASP Top 10.
Course 3: OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE)
-Take a deep dive into the third and fourth categories of security vulnerabilities in the OWASP Top 10—sensitive data exposure and XML external entities (XXE).
Course 4: OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
-Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.
Course 5: OWASP Top 10: #7 XSS and #8 Insecure Deserialization
-Learn about the seventh and eighth categories of security vulnerabilities in the OWASP Top 10—cross-site scripting (XSS) and insecure deserialization.
Course 6: OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
-Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.
Course 1: Learning the OWASP Top 10 (2018)
-Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
Course 2: OWASP Top 10: #1 Injection and #2 Broken Authentication
-Get an overview of the top two software vulnerabilities—injection and broken authentication attacks—described in the OWASP Top 10.
Course 3: OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE)
-Take a deep dive into the third and fourth categories of security vulnerabilities in the OWASP Top 10—sensitive data exposure and XML external entities (XXE).
Course 4: OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
-Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.
Course 5: OWASP Top 10: #7 XSS and #8 Insecure Deserialization
-Learn about the seventh and eighth categories of security vulnerabilities in the OWASP Top 10—cross-site scripting (XSS) and insecure deserialization.
Course 6: OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
-Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.
Courses
-
Learn about security misconfiguration and vulnerable and outdated components, the fifth and sixth most important security vulnerabilities listed on the 2021 OWASP Top 10.
-
Learn about broken access control and cryptographic failures, the first two security vulnerabilities listed on the 2021 OWASP Top 10.
-
Get an overview of the #3 and #4 top software vulnerabilities—injection and insecure design—described in the 2021 OWASP Top 10.
-
Prepare for the seventh and eighth most common vulnerabilities on the 2021 OWASP Top 10 List: identity and authentication failures, and software and data integrity failures.
-
Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
Taught by
Caroline Wong