An Introduction to OWASP Top 10 Vulnerabilities
5.0 /5
- Offered byCodered
An Introduction to OWASP Top 10 Vulnerabilities at Codered Overview
An Introduction to OWASP Top 10 Vulnerabilities
at Codered
Learn the Fundamentals of Security
Duration | 2 hours |
Total fee | ₹574 |
Mode of learning | Online |
Difficulty level | Beginner |
Credential | Certificate |
An Introduction to OWASP Top 10 Vulnerabilities at Codered Highlights
An Introduction to OWASP Top 10 Vulnerabilities
at Codered
- Certificate of Completion
- 10 Premium Lessons
An Introduction to OWASP Top 10 Vulnerabilities at Codered Course details
An Introduction to OWASP Top 10 Vulnerabilities
at Codered
Skills you will learn
What are the course deliverables?
- Explore Injection Vulnerabilities
- Understand Broken Authentication
- Learn about Sensitive Data Exposure
- Understand XML External Entities
- Explore Broken Access Control
- Understand Security Misconfiguration
- Learn about Cross-Site Scripting (XSS)
- Understand Insecure Deserialization
- Learn to use Components with Known Vulnerabilities
- Learn about Insufficient Logging and Monitoring
More about this course
- The online community for freely available tools and technologies in Web Application Security known as OWASP deals with tools, and technologies in the field of web application security
- The purpose of this course is to provide students with a fundamental understanding of computer security, through the study of the top 10 most common security vulnerabilities, as provided by OWASP.?This course can also serve to gain the foundations required to proceed to more advanced security topics
- By the end of this course, students will have enough of an understanding to make design choices that preserve the security of the applications they own
- This course can also serve to gain the foundations required to proceed to more advanced security topics
An Introduction to OWASP Top 10 Vulnerabilities at Codered Curriculum
An Introduction to OWASP Top 10 Vulnerabilities
at Codered
Chapter 1: OWASP Top 10
A1 - SQL Injection
A1 - Command Injection
A2 - Broken Authentication
A3 - Sensitive Data Exposure
A4 - XML External Entities (XXE)
A5 - Broken Access Control
A6 - Security Misconfiguration
A7 - Cross Site Scripting (XSS)
A8 - Insecure Deserialization
A9 - Using Components with Known Vulnerabilities
An Introduction to OWASP Top 10 Vulnerabilities at Codered Faculty details
An Introduction to OWASP Top 10 Vulnerabilities
at Codered
Scott, Instructor
Scott Cosentino is a developer and teacher who is passionate about learning. He works primarily in software development and computer security. Aside from this, he has taught students a variety of programming-related topics, and he loves to inspire students to be passionate about the topics that he teaches. He has experience in both large classes and one on one teaching. Scott believes that mathematics and computer science can be approachable and fun topics. he tailors his courses so that they are easy to comprehend, with an exploration of what, why, and how of every topic. He understands that these topics are not a spectator sport, so he provides as many examples and practises problems as possible so that the viewer can follow along and learn!
An Introduction to OWASP Top 10 Vulnerabilities at Codered Entry Requirements
An Introduction to OWASP Top 10 Vulnerabilities
at Codered
Other courses offered by Codered
View Other 1 Courses
An Introduction to OWASP Top 10 Vulnerabilities
at Codered
Student Forum
Anything you would want to ask experts?
Write here...