The OWASP Top 10 - Deep Dive

Explore in full details the OWASP top 10 Application Attacks and how to prevent them

Ratings 4.49 / 5.00
The OWASP Top 10 - Deep Dive

What You Will Learn!

  • The OWASP 10 Vulnerabilities
  • How Vulnerabilities are Exploited
  • Solutions and Preventions of the OWASP 10
  • Tools such as Hacksplaining and WebGoat

Description

Welcome to the OWASP Top 10 deep dive course where you will learn in full detail, the top ten vulnerabilities that applications face today.

The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications and has become such an important cyber security resource today.

Unlike other courses that take a lazy approach to describing these security risks, this course analyzes each vulnerability in full detail by describing

  • What exactly the vulnerabilities are

  • How they are exploited by attackers

  • How they can be prevented

  • Real world cases and scenarios where such vulnerabilities have been exploited

  • Practical demonstrations of the exploits where possible

We will be making use of some third party applications where applicable to perform some practical examples of some of these vulnerabilities.  I will also describe real world cyber attacks that have exploited some of these security risks whenever possible to add some more context.

We will also make use of some third party applications to try out some of these security risks and see how they are actually exploited in a real cyber attack.

Supplemental Material: A custom made PDF book that summarizes the entire course and one that you can use as a reference is available for you to download for free.

I hope to see you inside the course.

Alex.

Who Should Attend!

  • Cyber Security Professionals
  • Cyber Security Students

TAKE THIS COURSE

Tags

  • OWASP

Subscribers

3501

Lectures

39

TAKE THIS COURSE



Related Courses