We may earn an affiliate commission when you visit our partners.
Course image
John Wagnon

In this learning path, we will look at the OWASP organization and what its purpose is. We will then examine Broken Access Control, Cryptographic Failures, Injection Attacks, Insecure Design and Security Misconfiguration. We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.

Read more

In this learning path, we will look at the OWASP organization and what its purpose is. We will then examine Broken Access Control, Cryptographic Failures, Injection Attacks, Insecure Design and Security Misconfiguration. We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.

We will then examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). After we complete our look at the current OWASP Top Ten, we will examine three very relevant security risks that were merged into larger topics in the OWASP Top Ten 2021 list. It’s still important to know the details of how these risks work. We will explore XML External Entities (XXE), Cross-Site Scripting (XSS) and Insecure Deserialization.

Enroll now

Share

Help others find Specialization from Coursera by sharing it with your friends and followers:

What's inside

Three courses

OWASP Top 10 - Welcome and Risks 1-5

In this course, we will examine the OWASP organization and its purpose. We’ll dive into the details of the Top Ten list, including its origins, severity calculation, and ranking methodology. We will also review Broken Access Control, Cryptographic Failures, Injection Attacks, Insecure Design, and Security Misconfiguration, using demos, graphics, and real-life examples to illustrate each risk.

OWASP Top 10 - Risks 6-10

In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics, and real-life examples to help you understand the details of each of these risks.

Previous OWASP Risks

In this course, we will examine three security risks that were merged into larger topics in the OWASP Top Ten 2021 list: XML External Entities (XXE), Cross-Site Scripting (XSS), and Insecure Deserialization.

Save this collection

Save OWASP Top 10 - 2021 to your list so you can find it easily later:
Save
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser