Codered
Codered Logo

An Introduction to OWASP Top 10 Vulnerabilities 

  • Offered byCodered

An Introduction to OWASP Top 10 Vulnerabilities
 at 
Codered 
Overview

Learn the Fundamentals of Security

Duration

2 hours

Total fee

574

Mode of learning

Online

Difficulty level

Beginner

Credential

Certificate

An Introduction to OWASP Top 10 Vulnerabilities
 at 
Codered 
Highlights

  • Certificate of Completion
  • 10 Premium Lessons
Details Icon

An Introduction to OWASP Top 10 Vulnerabilities
 at 
Codered 
Course details

What are the course deliverables?
  • Explore Injection Vulnerabilities
  • Understand Broken Authentication
  • Learn about Sensitive Data Exposure
  • Understand XML External Entities
  • Explore Broken Access Control
  • Understand Security Misconfiguration
  • Learn about Cross-Site Scripting (XSS)
  • Understand Insecure Deserialization
  • Learn to use Components with Known Vulnerabilities
  • Learn about Insufficient Logging and Monitoring
More about this course
  • The online community for freely available tools and technologies in Web Application Security known as OWASP deals with tools, and technologies in the field of web application security
  • The purpose of this course is to provide students with a fundamental understanding of computer security, through the study of the top 10 most common security vulnerabilities, as provided by OWASP.?This course can also serve to gain the foundations required to proceed to more advanced security topics
  • By the end of this course, students will have enough of an understanding to make design choices that preserve the security of the applications they own
  • This course can also serve to gain the foundations required to proceed to more advanced security topics

An Introduction to OWASP Top 10 Vulnerabilities
 at 
Codered 
Curriculum

Chapter 1: OWASP Top 10

A1 - SQL Injection

A1 - Command Injection

A2 - Broken Authentication

A3 - Sensitive Data Exposure

A4 - XML External Entities (XXE)

A5 - Broken Access Control

A6 - Security Misconfiguration

A7 - Cross Site Scripting (XSS)

A8 - Insecure Deserialization

A9 - Using Components with Known Vulnerabilities

Faculty Icon

An Introduction to OWASP Top 10 Vulnerabilities
 at 
Codered 
Faculty details

Scott, Instructor
Scott Cosentino is a developer and teacher who is passionate about learning. He works primarily in software development and computer security. Aside from this, he has taught students a variety of programming-related topics, and he loves to inspire students to be passionate about the topics that he teaches. He has experience in both large classes and one on one teaching. Scott believes that mathematics and computer science can be approachable and fun topics. he tailors his courses so that they are easy to comprehend, with an exploration of what, why, and how of every topic. He understands that these topics are not a spectator sport, so he provides as many examples and practises problems as possible so that the viewer can follow along and learn!

An Introduction to OWASP Top 10 Vulnerabilities
 at 
Codered 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Codered

– / –
15 hours
Beginner
5.74 K
8 hours
– / –
– / –
1 hours
Beginner
Free
11 hours
Beginner
View Other 1 CoursesRight Arrow Icon
qna

An Introduction to OWASP Top 10 Vulnerabilities
 at 
Codered 

Student Forum

chatAnything you would want to ask experts?
Write here...