1. Course Introduction
Equip yourself to identify and address security risks, protect information & ensure online integrity.
Equip yourself to identify and address security risks, protect information & ensure online integrity.
1. Course Introduction
2. Introduction to Web Application Security
3. Broken Access Controls
4. Cryptographic Failures
5. Injection
6. Insecure Design
7. Security Misconfiguration
8. Vulnerable and Outdated Components
9. Identification and Authentication Failures
10. Software and Data Integrity Failures
11. Security Logging and Monitoring Failures
12. Server-Side Request Forgery (SSRF)
While prior experience in web application security or cybersecurity is not a prerequisite, having a solid foundation in the above areas will help you engage with the course content more effectively and grasp the core concepts of the OWASP Top 10 vulnerabilities and their exploitation.
The OWASP® Word Mark is a registered or unregistered service mark of OWASP Foundation, Inc. in the United States and other countries. All rights reserved. Unauthorized use strictly prohibited. For more information about the OWASP Foundation, please see owasp.org.