We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

Previous OWASP Risks

John Wagnon

In this course, we will examine three very relevant security risks that were merged into larger topics in the OWASP Top Ten 2021 list. It’s still important to know the details of how these risks work. We will explore XML External Entities (XXE), Cross-Site Scripting (XSS) and Insecure Deserialization.

Enroll now

What's inside

Syllabus

Overview
XML External Entities
Cross Site Scripting
Read more
Insecure Deserialization

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores XML External Entities (XXE), Cross-Site Scripting (XSS) and Insecure Deserialization, which are highly relevant to information security
Taught by John Wagnon, a recognized information security expert
Examines the details of how these risks work, providing a strong foundation for learners
Assumes some prior knowledge of information security concepts

Save this course

Save Previous OWASP Risks to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Previous OWASP Risks. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Previous OWASP Risks will develop knowledge and skills that may be useful to these careers:
Forensic Investigator
Forensic Investigators investigate cybercrimes and computer-related incidents. They work to collect and analyze evidence to identify the perpetrators of cybercrimes and to help organizations recover from cyberattacks. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Malware Analyst
Malware Analysts analyze malware to identify its purpose, functionality, and impact. They work to develop new malware detection and prevention techniques to help protect organizations from cyberattacks. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Information Security Manager
Information Security Managers oversee the development and implementation of security policies and procedures within an organization. They work to ensure that security policies and procedures are effective, efficient, and scalable. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Security Architect
Security Architects design and implement security solutions for organizations. They work to ensure that security solutions are effective, efficient, and scalable. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for the overall security of an organization's information and systems. They work to develop and implement security policies and procedures, and to oversee the development and implementation of security solutions. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Security Researcher
Security Researchers identify and exploit security vulnerabilities in software and systems. They work to develop new security tools and techniques to help protect organizations from cyberattacks. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Security Engineer
Security Engineers design, implement, and manage security controls to protect an organization's information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security measures to mitigate these risks.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They work to help organizations identify and mitigate security risks. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Incident Responder
Incident Responders handle and respond to cyberattacks and other security incidents. They work to minimize the impact of security incidents and to help organizations recover from cyberattacks. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Penetration Tester
Penetration Testers simulate cyberattacks to identify and exploit security vulnerabilities in software and systems. They work to help organizations improve their security posture by identifying and fixing security vulnerabilities. This course may be useful in helping you to build a foundation in the principles of information security. You will learn about the different types of security risks that organizations face, and how to develop and implement security solutions to mitigate these risks.
Information Security Analyst
Information Security Analysts work to secure computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course may be useful in helping you to understand the risks associated with XML External Entities (XXE), Cross-Site Scripting (XSS), and Insecure Deserialization. These are all common vulnerabilities that can be exploited by attackers to gain unauthorized access to data or systems. By understanding these risks, you can help to protect your organization from cyberattacks.
Web Developer
Web Developers design, develop, and maintain websites. They work to ensure that websites are secure, reliable, and efficient. This course may be useful in helping you to understand the security risks associated with developing websites. You will learn about the different types of security vulnerabilities that can be introduced into websites, and how to develop secure websites.
Network Administrator
Network Administrators manage and maintain computer networks. They work to ensure that networks are secure, reliable, and efficient. This course may be useful in helping you to understand the security risks associated with managing networks. You will learn about the different types of security vulnerabilities that can be introduced into networks, and how to develop secure networks.
Database Administrator
Database Administrators manage and maintain databases. They work to ensure that databases are secure, reliable, and efficient. This course may be useful in helping you to understand the security risks associated with managing databases. You will learn about the different types of security vulnerabilities that can be introduced into databases, and how to develop secure databases.
Software Developer
Software Developers design, develop, and test software applications. They work to ensure that software applications are secure, reliable, and efficient. This course may be useful in helping you to understand the security risks associated with developing software applications. You will learn about the different types of security vulnerabilities that can be introduced into software applications, and how to develop secure software applications.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Previous OWASP Risks.
Practical guide to finding and exploiting web application security flaws. It provides in-depth coverage of various attack techniques, including those related to OWASP risks.
This document provides a set of proactive controls to mitigate OWASP risks. It serves as a valuable reference for implementing security measures in web applications.
Comprehensive guide to securing modern web applications. It covers various security topics, including OWASP risks.
Provides a detailed overview of cross-site scripting attacks, covering topics such as attack vectors, prevention techniques, and detection methods.
Outlines the principles and practices of secure coding. It addresses various security risks, including those related to web application security.
Provides a comprehensive overview of web application security, covering topics such as SQL injection, cross-site scripting, and CSRF.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser