- 0
- Less than 1 hour of material
- LinkedIn Learning
- English
Course Overview
Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
Course Circullum
Introduction
- Welcome
- OWASP and the OWASP Top 10
- Injection
- Broken authentication and session management
- Sensitive data exposure
- XML external entity (XXE)
- Broken access control
- Security misconfiguration
- Cross-site scripting
- Insecure deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
- Next steps
Item Reviews - 3
Submit Reviews
This Course Include:
Introduction
- Welcome
- OWASP and the OWASP Top 10
- Injection
- Broken authentication and session management
- Sensitive data exposure
- XML external entity (XXE)
- Broken access control
- Security misconfiguration
- Cross-site scripting
- Insecure deserialization
- Using components with known vulnerabilities
- Insufficient logging and monitoring
- Next steps
- Provider:LinkedIn Learning
- Certificate:Certificate Available
- Language:English
- Duration:Less than 1 hour of material
- Language CC: