Introduction to the OWASP Top 10 – 2021

Learn the OWASP Top 10 Risks
Introduction to the OWASP Top 10 – 2021
File Size :
1.62 GB
Total length :
1h 42m

Category

Instructor

Jim Manico

Language

Last update

Last updated 9/2022

Ratings

4.3/5

Introduction to the OWASP Top 10 – 2021

What you’ll learn

Some of the best protection strategies that help avoid each OWASP Top 10 risk from materializing
The main challenges that cause each OWASP Top 10 risk
Examples of good and bad code for each OWASP Top 10 risk using pseudocode
Definition of each of the OWASP Top 10 risk
What are the key information security concepts required to understand each OWASP Top 10 risk
What are the OWASP Top 10 risks and how this list gets periodically updated
What is the OWASP Foundation and how you can be part of this open-source community

Introduction to the OWASP Top 10 – 2021

Requirements

No programming experience needed you will learn everything you need to know
Curiosity on web application security risks

Description

Welcome to this beginner course on the OWASP Top 10, as it was last updated in 2021 almost beginning of 2022. This course has no technical prerequisites, it is truly meant for everyone. Whether you are a risk manager, an auditor, a cybersecurity professional, or maybe you are a software developer or simply curious on application security and looking for an introduction to the OWASP Top 10: This course is for you!In this course you will learn a little bit about the OWASP Foundation and how you can be part of this opensource community. We are going to learn what are the OWASP Top 10 risks of 2021 and how this list of risks gets periodically updated.For each of the OWASP Top 10 risks, we are going to look at the key information security concepts, so that you better understand the definition of each risk. Then we are going to – together – define each risk – and we are going to do this in layman’s terms, so that you really understand each risk. We are also going to look at the main challenges that developers and others face that cause each risk. Finally, we are going to give examples of good and bad code using pseudocode and we are going to conclude with some of the best protection practices to help you and your team avoid each risk from materializing.

Overview

Section 1: Introduction to the OWASP Top 10 – 2021

Lecture 1 Introduction

Lecture 2 Risk A1: Broken Access Control

Lecture 3 Risk A2: Cryptographic Failures

Lecture 4 Risk A3: Injection

Lecture 5 Risk A4: Insecure Design

Lecture 6 Risk A5: Security Misconfiguration

Lecture 7 Risk A6: Vulnerable and Outdated Components

Lecture 8 Risk A7: Authentication and Identification Failures

Lecture 9 Risk A8: Software and Integrity Failures

Lecture 10 Risk A9: Security Logging and Monitoring Failures

Lecture 11 Risk A10: Server-Side Request Forgery

Lecture 12 Summary: What We Learned

This course has no technical prerequisites, it is truly meant for everyone,Beginner web application and API developers,Risk managers and auditor looking to understand the OWASP Top 10 risks,Cybersecurity professionals looking for an introduction to the OWASP Top 10

Course Information:

Udemy | English | 1h 42m | 1.62 GB
Created by: Jim Manico

You Can See More Courses in the Developer >> Greetings from CourseDown.com

New Courses

Scroll to Top