Subject
Computer Science
Business
Humanities
Data Science
Personal Development
Art & Design
Programming
Engineering
Health & Medicine
Mathematics
Science
Social Sciences
Education & Teaching
Online degrees
Microcredentials
Provider
Unitersity
Institution
Picture book
SignIn
SignUp
Subject
Computer Science
Business
Humanities
Data Science
Personal Development
Art & Design
Programming
Engineering
Health & Medicine
Mathematics
Science
Social Sciences
Education & Teaching
Online degrees
Microcredentials
Provider
Unitersity
Institution
Picture book
SignIn
SignUp
Learning the OWASP Top 10
0
Join & Subscribe
LinkedIn Learning
Free Trial Available
English
Certificate Available
Less than 1 hour of material
selfpaced
Overview
Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
Syllabus
Introduction
Welcome
OWASP and the OWASP Top 10
1. The Top 10
Injection
Broken authentication and session management
Sensitive data exposure
XML external entity (XXE)
Broken access control
Security misconfiguration
Cross-site scripting
Insecure deserialization
Using components with known vulnerabilities
Insufficient logging and monitoring
Conclusion
Next steps
Taught by
Caroline Wong
Related Courses
Soft Skills for Information Security Professionals
CIPP/US Cert Prep: 3 Government and Court Access to Information
Cloud Security Considerations for Government and the Military
Digital Forensic
Creating a Security Awareness Program
Learning the OWASP Top 10