Master the OWASP Top 10

Go to class
Write Review

Free Online Course: Master the OWASP Top 10 provided by LinkedIn Learning is a comprehensive online course. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Master the OWASP Top 10 is taught by Caroline Wong.

Overview
  • OWASP Top 10 describes the ten biggest software vulnerabilities. In this learning path, you can take a deep dive into each category, examining real-world examples that demonstrate how companies and consumers alike are affected, and learn techniques that can help you prevent these types of attacks.

    • Identify the vulnerabilities that make up the OWASP Top 10.
    • Learn how to prevent common software vulnerabilities.
    • Find out how to enhance software security.

Syllabus
  • Courses under this program:
    Course 1: Learning the OWASP Top 10 (2018)
    -Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).

    Course 2: OWASP Top 10: #1 Injection and #2 Broken Authentication
    -Get an overview of the top two software vulnerabilities—injection and broken authentication attacks—described in the OWASP Top 10.

    Course 3: OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE)
    -Take a deep dive into the third and fourth categories of security vulnerabilities in the OWASP Top 10—sensitive data exposure and XML external entities (XXE).

    Course 4: OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
    -Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.

    Course 5: OWASP Top 10: #7 XSS and #8 Insecure Deserialization
    -Learn about the seventh and eighth categories of security vulnerabilities in the OWASP Top 10—cross-site scripting (XSS) and insecure deserialization.

    Course 6: OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring
    -Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.