We may earn an affiliate commission when you visit our partners.
Course image
Troy Hunt and Andrew van der Stock
Play by Play is a series in which top technologists work through a problem in real time, unrehearsed, and unscripted. In this course, Play by Play: OWASP Top 10 2017, Troy Hunt and Andrew van der Stock discuss the methodology used to construct the 2017 version of the OWASP Top 10. You’ll learn how the analysis of the data collected resulted in a reordering of the risks from the 2013 version, the inclusion of new risks, and the demotion of some risks that were included in previous versions. By the end of this course, you’ll be familiar with each risk and understand how best to use the 2017 OWASP Top 10.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores the OWASP Top 10 methodology, which is critical in web security
Teaches how OWASP Top 10 data is analyzed and used to determine and rank risks
Taught by Troy Hunt and Andrew van der Stock, who are recognized experts in web security
Examines the 2017 OWASP Top 10, which is highly relevant to web development and security
Provides a comprehensive understanding of each OWASP Top 10 risk and its mitigation techniques
Part of a Play by Play series, providing a unique and engaging approach to learning web security

Save this course

Save Play by Play: OWASP Top 10 2017 to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Play by Play: OWASP Top 10 2017 . These are activities you can do either before, during, or after a course.

Career center

Learners who complete Play by Play: OWASP Top 10 2017 will develop knowledge and skills that may be useful to these careers:
Security Analyst
Security analysts plan and implement security measures to protect an organization's computer systems and networks. They analyze the organization's security risks and vulnerabilities and develop plans to mitigate them. They also monitor security systems and respond to security incidents. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as a security analyst by providing you with a deep understanding of the OWASP Top 10, which is a list of the most critical web application security risks. This knowledge will help you to identify and mitigate security risks in your organization's web applications.
Security Engineer
Security engineers design, implement, and maintain security systems and networks. They work with security analysts to identify and mitigate security risks. They also develop and implement security policies and procedures. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as a security engineer by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to design and implement secure systems and networks.
Penetration Tester
Penetration testers assess the security of computer systems and networks by simulating attacks. They identify vulnerabilities in systems and networks and report their findings to the organization. They also recommend measures to mitigate the vulnerabilities. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as a penetration tester by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to identify vulnerabilities in systems and networks.
Web Developer
Web developers design, develop, and maintain web applications. They work with security analysts and engineers to ensure that web applications are secure. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as a web developer by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to develop secure web applications.
Information Security Manager
Information security managers oversee the security of an organization's information systems and networks. They develop and implement security policies and procedures. They also work with security analysts and engineers to identify and mitigate security risks. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as an information security manager by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to develop and implement effective security policies and procedures.
Security Consultant
Security consultants provide advice and guidance to organizations on security matters. They help organizations to identify and mitigate security risks. They also develop and implement security policies and procedures. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as a security consultant by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to provide sound advice to organizations on security matters.
Information Security Auditor
Information security auditors assess the security of an organization's information systems and networks. They identify vulnerabilities in systems and networks and report their findings to the organization. They also recommend measures to mitigate the vulnerabilities. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as an information security auditor by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to identify vulnerabilities in systems and networks.
Risk Manager
Risk managers identify and assess risks to an organization. They develop and implement strategies to mitigate risks. They also work with security analysts and engineers to identify and mitigate security risks. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as a risk manager by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to identify and assess risks to an organization.
Technical Writer
Technical writers develop and write technical documentation. They work with security analysts and engineers to document security policies and procedures. They also write technical white papers and articles. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as a technical writer by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to write clear and concise technical documentation.
Compliance Officer
Compliance officers ensure that an organization complies with laws and regulations. They develop and implement compliance policies and procedures. They also work with security analysts and engineers to ensure that the organization's security measures comply with laws and regulations. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as a compliance officer by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to develop and implement effective compliance policies and procedures.
Incident Responder
Incident responders respond to security incidents. They identify and mitigate the damage caused by security incidents. They also work with security analysts and engineers to prevent future security incidents. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as an incident responder by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to identify and mitigate the damage caused by security incidents.
Security Architect
Security architects design and implement security architectures for organizations. They work with security analysts and engineers to identify and mitigate security risks. They also develop and implement security policies and procedures. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as a security architect by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to design and implement effective security architectures.
Forensic Analyst
Forensic analysts investigate computer crimes. They collect and analyze evidence from computer systems and networks. They also provide expert testimony in court. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as a forensic analyst by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to identify and collect evidence from computer systems and networks.
IT Manager
IT managers oversee the IT operations of an organization. They develop and implement IT policies and procedures. They also work with security analysts and engineers to ensure that the organization's IT systems and networks are secure. The Play by Play: OWASP Top 10 2017 course can help you prepare for a career as an IT manager by providing you with a deep understanding of the OWASP Top 10. This knowledge will help you to develop and implement effective IT policies and procedures.
Project Manager
Project managers plan and execute projects. They work with security analysts and engineers to implement security measures. They also track the progress of projects and ensure that they are completed on time and within budget. The Play by Play: OWASP Top 10 2017 course may be useful for you if you are interested in becoming a project manager. This course will provide you with a deep understanding of the OWASP Top 10, which will help you to identify and mitigate security risks in your projects.

Reading list

We haven't picked any books for this reading list yet.
Provides a gentle introduction to web application security for beginners, covering the basics of web application security and the OWASP Top 10.
Provides a concise guide to the OWASP Top 10 for penetration testers, covering the most critical web application security risks and how to exploit them.
Uses Java as a case study to teach secure coding practices and how to avoid the most common application security vulnerabilities.
Provides a concise guide to the OWASP Top 10 for developers, covering the most critical web application security risks and how to mitigate them.
Provides a comprehensive guide to software security testing, covering a wide range of topics from threat modeling to penetration testing.
Provides a step-by-step guide to understanding the ten most common web application security vulnerabilities, and how to exploit them to gain unauthorized access to websites and applications.
Provides one of the best introductions to the Java programming language and great starting point for learning how to write secure code.
Provides a cookbook of recipes for testing web applications for security vulnerabilities, covering a wide range of topics from basic to advanced.
Provides a detailed look at malware analysis, teaching readers how to identify, analyze, and respond to malicious software. It covers many technical details, including reverse engineering and debugging malware.
Focuses on the subject of insider threats to information security. The authors bring their real-world experience as CERT cybersecurity experts to provide a comprehensive examination of this problem.
Provides a more hands-on approach to learning about information security with labs in each chapter. It introduces students to real-world information security challenges, teaching them how to protect systems and networks from attack.
Comprehensive guide to cloud security. It covers a wide range of topics, including cloud security threats and countermeasures, cloud security best practices, and cloud security compliance.
Foundational work on cryptography and network security. It provides a broad overview of the field, covering topics such as symmetric-key encryption, public-key encryption, and network security protocols. It is an excellent resource for learning the fundamentals of cryptography and network security.
Practical guide to security penetration testing. It covers a wide range of topics, including vulnerability assessment, exploitation, and reporting. It is an excellent resource for learning how to perform security penetration tests.
Comprehensive overview of computer security. It covers a wide range of topics, including security models, access control, software security, and network security. It is an excellent resource for learning about the different aspects of computer security.
Comprehensive guide to web application security. It covers a wide range of topics, including web application vulnerabilities, web application security testing, and web application security best practices.
Focuses on bridging the gap between theory and practice by presenting theories, concepts, and models for information security risk management, while also sharing best practices with practical applications.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser