Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Learning the OWASP Top 10

via LinkedIn Learning

Overview

Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).

It seems like there is a security-related incident in the news every day. What makes systems—and the software that runs them—vulnerable to attack? The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand and improve software security. The OWASP Top 10 list describes the ten biggest vulnerabilities. In this course, application security expert Caroline Wong provides an overview of the 2017 OWASP Top 10, presenting information about each vulnerability category, its prevalence, and its impact. Though aimed at IT security professionals and developers, anyone who uses web applications will benefit from an understanding of these risks.
Note: More information about the OWASP Top 10 list can be found on the Cobalt website.

Syllabus

Introduction
  • Welcome
  • OWASP and the OWASP Top 10
1. The Top 10
  • Injection
  • Broken authentication and session management
  • Sensitive data exposure
  • XML external entity (XXE)
  • Broken access control
  • Security misconfiguration
  • Cross-site scripting
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
Conclusion
  • Next steps

Taught by

Caroline Wong

Related Courses

Reviews

Start your review of Learning the OWASP Top 10

Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free