This course aims to teach learners about the OWASP top 10 in bite size modules, we will look at the OWASP top 10 vulnerabilities and mitigations available to any development environment. Learners will be able to challenge for the Certified OWASP Security Fundamentals Exam, post course. We can also teach this course over a shorter period as a facilitated 4hr workshop, focused on the specific topics of interest.
It is important to understand that this is the baseline set of security standards. Remembering that this knowledge can be reused across technology stacks.
- Broken Access Controls
- Cryptographic Failures
- Injection
- Insecure Design
- Security Misconfiguration
- Vulnerable and Outdated Components
- Identification and Authentication Failures
- Software and Data Integrity Failures
- Security Logging and Monitoring Failures
- Server-Side Request Forgery (SSRF)
Recent Comments