We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

OWASP Top 10 - Risks 6-10

John Wagnon

In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.

Enroll now

What's inside

Syllabus

Vulnerable and Outdated Components
Identification and Authentication Failures
Software and Data Integrity Failures
Read more
Security Logging and Monitoring Failures
Server-Side Request Forgery (SSRF)

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Helps learners identify and understand Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF)
Builds a strong foundation for beginners in the world of industry standard security risks
Taught by John Wagnon, an instructor recognized worldwide for their work with security
Strengthens an existing foundation for intermediate learners in the world of industry standard security risks
Explores Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF), all of which are highly relevant to industry
Part of a series of courses, indicating comprehensiveness and detail

Save this course

Save OWASP Top 10 - Risks 6-10 to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for OWASP Top 10 - Risks 6-10. These are activities you can do either before, during, or after a course.

Career center

Learners who complete OWASP Top 10 - Risks 6-10 will develop knowledge and skills that may be useful to these careers:
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for overseeing an organization's information security program. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Security Architect
A Security Architect designs and implements security solutions for an organization. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Penetration Tester
A Penetration Tester is responsible for identifying vulnerabilities in an organization's computer systems and networks. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Security Researcher
A Security Researcher is responsible for identifying and researching vulnerabilities in computer systems and networks. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Information Security Manager
An Information Security Manager is responsible for managing an organization's information security program. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for protecting an organization's computer systems and networks from cyberattacks. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to improve their security posture. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Security Operations Center (SOC) Analyst
A Security Operations Center (SOC) Analyst is responsible for monitoring and responding to security incidents. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Security Engineer
A Security Engineer designs, implements, and maintains security measures to protect an organization's computer systems and networks. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Systems Administrator
A Systems Administrator is responsible for managing and maintaining computer systems and networks. This course may be useful for someone in this role because it covers a range of topics related to system security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Software Developer
A Software Developer designs, develops, and maintains software applications. This course may be useful for someone in this role because it covers a range of topics related to software security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, and server-side request forgery (SSRF).
IT Auditor
An IT Auditor is responsible for evaluating an organization's computer systems and networks to ensure that they are secure and compliant with regulations. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Risk Manager
A Risk Manager is responsible for identifying and assessing risks to an organization. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).
Network Engineer
A Network Engineer designs, implements, and maintains computer networks. This course may be useful for someone in this role because it covers a range of topics related to network security, including vulnerable and outdated components, identification and authentication failures, and server-side request forgery (SSRF).
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's computer systems and networks from cyberattacks. This course may be useful for someone in this role because it covers a range of topics related to information security, including vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF).

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in OWASP Top 10 - Risks 6-10.
The definitive guide to the OWASP Top 10 web application security risks, providing detailed information on each risk and how to mitigate it.
A comprehensive guide to web application security, covering topics such as vulnerable components, authentication failures, and data integrity failures.
A practical guide to secure coding, covering topics such as input validation, error handling, and memory management.
A fascinating and informative look at the human element of security, covering topics such as social engineering, phishing, and deception.
A practical guide to penetration testing, covering topics such as reconnaissance, exploitation, and reporting.
A comprehensive guide to cryptography, covering topics such as encryption, decryption, and digital signatures.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser