We may earn an affiliate commission when you visit our partners.
Course image
John Wagnon

In this course, we will examine three very relevant security risks that were merged into larger topics in the OWASP Top Ten 2021 list. It’s still important to know the details of how these risks work. We will explore XML External Entities (XXE), Cross-Site Scripting (XSS) and Insecure Deserialization.

Enroll now

What's inside

Syllabus

Overview
XML External Entities
Cross Site Scripting
Read more
Insecure Deserialization

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores XML External Entities (XXE), Cross-Site Scripting (XSS) and Insecure Deserialization, which are highly relevant to information security
Taught by John Wagnon, a recognized information security expert
Examines the details of how these risks work, providing a strong foundation for learners
Assumes some prior knowledge of information security concepts

Save this course

Save Previous OWASP Risks to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Previous OWASP Risks with these activities:
Review XML Parsing Basics
Strengthen your foundation in XML parsing to better understand XXE vulnerabilities
Browse courses on XML Parsing
Show steps
  • Read documentation or tutorials on XML parsing
  • Practice parsing XML documents using a programming language of your choice
Connect with Web Application Security Professionals
Gain guidance and insights from experienced professionals in the field
Browse courses on Mentorship
Show steps
  • Attend industry events and meetups
  • Reach out to professionals on LinkedIn and request informational interviews
  • Join online communities and forums related to web application security
Read 'Web Hacking 101' by Peter Yaworski
Gain a comprehensive understanding of web application hacking techniques and countermeasures
Show steps
  • Read the book thoroughly
  • Take notes and highlight important concepts
  • Review the book regularly to reinforce your understanding
Six other activities
Expand to see all activities and additional details
Show all nine activities
Form a Study Group with Classmates
Enhance your understanding through collaboration and peer support
Browse courses on Collaboration
Show steps
  • Find classmates who are interested in forming a study group
  • Establish a regular meeting schedule and location
  • Take turns presenting on different topics and discussing your understanding
  • Work together to solve problems and clarify concepts
Practice XSS Fuzzing
Improve your understanding of XSS vulnerabilities
Browse courses on Cross-Site Scripting
Show steps
  • Find a safe environment to practice, such as DVWA (Damn Vulnerable Web Application)
  • Use different inputs and techniques to test for XSS vulnerabilities
  • Analyze the results and try to understand how XSS vulnerabilities work
Attend a Web Application Security Workshop
Gain practical experience in web application security
Browse courses on Web Application Security
Show steps
  • Research and find a relevant workshop
  • Register and attend the workshop
  • Participate actively in the exercises and discussions
Build a Web Application that is Resistant to XSS
Apply your knowledge of XSS vulnerabilities and countermeasures in a practical setting
Browse courses on Cross-Site Scripting
Show steps
  • Design and implement a secure web application using appropriate input validation and encoding techniques
  • Test your application thoroughly for XSS vulnerabilities using manual and automated testing methods
  • Document your findings and recommendations for improving the security of your application
Create a Series of Blog Posts on XXE
Deepen your understanding of XXE vulnerabilities and share your knowledge with others
Show steps
  • Research and gather information on XXE vulnerabilities
  • Write a series of blog posts explaining different aspects of XXE, including examples and countermeasures
  • Publish your blog posts on a platform such as Medium or your own website
Participate in Bug Bounty Programs
Test your skills in identifying and reporting real-world vulnerabilities
Show steps
  • Find and join reputable bug bounty programs
  • Review the program guidelines and scope
  • Start testing applications and reporting any vulnerabilities you find

Career center

Learners who complete Previous OWASP Risks will develop knowledge and skills that may be useful to these careers:
Forensic Investigator
Forensic Investigators investigate cybercrimes and computer-related incidents. They work to collect and analyze evidence to identify the perpetrators of cybercrimes and to help organizations recover from cyberattacks. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Malware Analyst
Malware Analysts analyze malware to identify its purpose, functionality, and impact. They work to develop new malware detection and prevention techniques to help protect organizations from cyberattacks. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Information Security Manager
Information Security Managers oversee the development and implementation of security policies and procedures within an organization. They work to ensure that security policies and procedures are effective, efficient, and scalable. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Security Architect
Security Architects design and implement security solutions for organizations. They work to ensure that security solutions are effective, efficient, and scalable. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for the overall security of an organization's information and systems. They work to develop and implement security policies and procedures, and to oversee the development and implementation of security solutions. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Security Researcher
Security Researchers identify and exploit security vulnerabilities in software and systems. They work to develop new security tools and techniques to help protect organizations from cyberattacks. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Security Engineer
Security Engineers design, implement, and manage security controls to protect an organization's information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security measures to mitigate these risks.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They work to help organizations identify and mitigate security risks. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Incident Responder
Incident Responders handle and respond to cyberattacks and other security incidents. They work to minimize the impact of security incidents and to help organizations recover from cyberattacks. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Penetration Tester
Penetration Testers simulate cyberattacks to identify and exploit security vulnerabilities in software and systems. They work to help organizations improve their security posture by identifying and fixing security vulnerabilities. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Information Security Analyst
Information Security Analysts work to secure computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful in helping you to understand the risks associated with XML External Entities (XXE), Cross-Site Scripting (XSS), and Insecure Deserialization. These are all common vulnerabilities that can be exploited by attackers to gain unauthorized access to data or systems. By understanding these risks, you can help to protect your organization from cyberattacks.
Web Developer
Web Developers design, develop, and maintain websites. They work to ensure that websites are secure, reliable, and efficient. This course may be useful in helping you to understand the security risks associated with developing websites. You will learn about the different types of security vulnerabilities that can be introduced into websites, and how to develop secure websites.
Network Administrator
Network Administrators manage and maintain computer networks. They work to ensure that networks are secure, reliable, and efficient. This course may be useful in helping you to understand the security risks associated with managing networks. You will learn about the different types of security vulnerabilities that can be introduced into networks, and how to develop secure networks.
Database Administrator
Database Administrators manage and maintain databases. They work to ensure that databases are secure, reliable, and efficient. This course may be useful in helping you to understand the security risks associated with managing databases. You will learn about the different types of security vulnerabilities that can be introduced into databases, and how to develop secure databases.
Software Developer
Software Developers design, develop, and test software applications. They work to ensure that software applications are secure, reliable, and efficient. This course may be useful in helping you to understand the security risks associated with developing software applications. You will learn about the different types of security vulnerabilities that can be introduced into software applications, and how to develop secure software applications.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Previous OWASP Risks.
Practical guide to finding and exploiting web application security flaws. It provides in-depth coverage of various attack techniques, including those related to OWASP risks.
This document provides a set of proactive controls to mitigate OWASP risks. It serves as a valuable reference for implementing security measures in web applications.
Comprehensive guide to securing modern web applications. It covers various security topics, including OWASP risks.
Provides a detailed overview of cross-site scripting attacks, covering topics such as attack vectors, prevention techniques, and detection methods.
Outlines the principles and practices of secure coding. It addresses various security risks, including those related to web application security.
Provides a comprehensive overview of web application security, covering topics such as SQL injection, cross-site scripting, and CSRF.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser