Learn the OWASP top 10 vulnerabilities for compliance. Examine proven countermeasures and explore best practices in secure web development.
Course Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Overview
- #1 Injection Flaws (16:19)
- #2 - Broken Authentication (33:42)
- #3 Sensitive Data Exposure (18:03)
- #4 XML External Entities (XXE) (3:34)
- #6 Security Misconfiguration (7:33)
- #5 Broken Access Control (22:26)
- #7 Cross Site Scripting (21:13)
- #8 Insecure Deserialization (5:08)
- #9 Using Components with Known Vulnerabilities (6:00)
- #10 Insufficient Logging & Monitoring (4:55)
Available in
days
days
after you enroll