OWASP Top 10
7 H 53 M
Just you? Training a whole team? There's an ITProTV plan that fits.
Start Training TodayEpisodes
Episodes
- Course Overview
- Course Overview
- Broken Access Control
- Exploit: Broken Access Control
- Fix: Broken Access Control
- Verify: Broken Access Control
- Cryptographic Failures
- Exploit: Cryptographic Failures
- Fix: Cryptographic Failures
- Verify: Cryptographic Failures
- Injection
- Exploit: Injection
- Fix: Injection
- Verify: Injection
- Insecure Design
- Exploit: Insecure Design
- Fix: Insecure Design
- Verify: Insecure Design
- Security Misconfiguration
- Exploit: Security Misconfiguration
- Fix: Security Misconfiguration
- Verify: Security Misconfiguration
- Vulnerable and Outdated Components
- Exploit: Vulnerable and Outdated Components
- Fix: Vulnerable and Outdated Components
- Verify: Vulnerable and Outdated Components
- Identification and Authentication Failures
- Exploit: Identification and Authentication Failures
- Fix: Identification and Authentication Failures
- Verify: Identification and Authentication Failures
- Software and Data Integrity Failures
- Exploit: Software and Data Integrity Failures
- Fix: Software and Data Integrity Failures
- Verify: Software and Data Integrity Failures
- Security Logging and Monitoring Failures
- Exploit: Security Logging and Monitoring Failures
- Fix: Security Logging and Monitoring Failures
- Verify: Security Logging and Monitoring Failures
- Server-Side Request Forgery
- Exploit: Server-Side Request Forgery
- Fix: Server-Side Request Forgery
- Verify: Server-Side Request Forgery
Course Overview
4 M



- Episode Description
- Transcript
This course is designed to teach you about the 2021 version of the OWASP Top 10 Web Application Vulnerabilities. The OWASP Top 10 is a list of the most critical security risks to web applications, and it is widely used by organizations to improve their web application security. This course will cover each of the OWASP Top 10 vulnerabilities in detail, including: What the vulnerability is Explanations of how it could be exploited Real-world examples of how the vulnerability has been exploited Possible detections and fixes of the vulnerability The course will also include demonstrations of each vulnerability so that you can see how they work in practice. Additionally, the course will explore possible fixes and/or mitigations for each vulnerability. By the end of this course, you will have a good understanding of the OWASP Top 10 Web Application Vulnerabilities and how to protect your web applications from them.