Course Outline

Introduction

OWASP Top Ten

  • A01 Broken Access Control

  • A02 Cryptographic Failures

  • A03 Injection

  • A04 Insecure Design

  • A05 Security Misconfiguration

  • A06 Vulnerable and Outdated Components

  • A07 Identification and Authentication Failures

  • A08 Software and Data Integrity Failures

  • A09 Security Logging and Monitoring Failures

  • A10 Server Side Request Forgery (SSRF)

Summary and Next Steps

Requirements

  • A general understanding of web development lifecycle
  • Experience in web application development and security

Audience

  • Web developers
  • Leaders
 14 Hours

Testimonials (5)

Related Categories