Booking options
£82.99
£82.99
On-Demand course
2 hours 1 minutes
All levels
Welcome to this course on OWASP Top 10 where we will take a closer look at the top ten vulnerabilities that applications face today. This is a mix of both theory as well as practical and explains to you the real-world cyber-attacks on various companies and web applications.
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications and has become such an important cyber security resource today. Unlike other courses that take a lazy approach to describe these security risks, this course analyzes each vulnerability in sufficient detail by describing what exactly the vulnerabilities are. The OWASP top 10 vulnerabilities explained in detail are Broken Access Control, Cryptographic Failures, SQL Injection Attacks, Cross Site Scripting Attacks, Insecure Design, Security Misconfiguration, Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery. We will discuss how they are exploited by attackers and how they can be prevented. We will also look at real-world cases and scenarios where such vulnerabilities have been exploited. We will also make use of some third-party applications to try out some of these security risks and see how they are exploited in a real cyber-attack. By the end of the course, you will be able to protect your web applications from various vulnerability attacks. All resources are placed here: https://github.com/PacktPublishing/A-Detailed-Guide-to-the-OWASP-Top-10
Understand broken access control and its prevention
Understand cryptographic failures and their prevention
Understand SQL injection attacks
Understand cross-site scripting attacks
Understand security misconfiguration and its prevention
Understand server-side request forgery and its prevention
This course is for cybersecurity professionals and cybersecurity students who would like to stay safe from vulnerabilities on the Internet. An understanding of the basics of cyber security is required to take up the course.
This is a highly practical and hands-on course on understanding the top 10 OWASP vulnerabilities. This course comes with real-world examples and an eBook about the top 10 OWASP attacks.
Learn to use tools such as Hacksplaining and WebGoat * Understand the OWASP 10 vulnerabilities * Explore the solutions and preventions of the OWASP 10
https://github.com/PacktPublishing/A-Detailed-Guide-to-the-OWASP-Top-10
Alexander Oni is a bestselling instructor with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for three years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His success in Udemy has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly travelling, spending a month in every city and moving to the next. His hobbies include watching movies, sports, and chess.
1. Introduction
1. Promotional Video This video introduces you to the course and the author. |
2. Introduction This video is a brief explanation of the course and what to expect from the course. |
3. The Tools We Shall Use This video explains the tools that we will be using in the course, such as Hacksplaining. |
2. OWASP Top 10
1. #1 Broken Access Control This video explains A01:2021 - broken access control, which is the most significant security risk-facing application. |
2. #1 Broken Access Control Prevention This video explains how to prevent broken access control on our website or on our applications. |
3. #2 Cryptographic Failures This video explains A02: 2021 - cryptographic failures, which focuses on failures related to cryptography. |
4. Quick Notice This video is a quick notice to SQL before diving into other attacks. |
5. Understanding SQL and Databases This video explains databases and Structured Query Language (SQL). |
6. #3 SQL Injection Attacks This video explains the most common type of attack on a website, which is the SQL injection attack. |
7. #3 Cross-Site Scripting Attacks This video explains another important client-side based attack, which is called the cross-site scripting attack. |
8. #4 Insecure Design This video explains the A04: 2021 - insecure design, which focuses on risks related to design and architectural flaws. |
9. #4 Insecure Design Prevention This video explains how to prevent insecure design when developing software. |
10. #5 Security Misconfiguration This video explains the A05 - security misconfiguration using an attack scenario. |
11. #5 Security Misconfiguration Prevention This video explains the steps to be taken to prevent the OWASP 05 security misconfiguration. |
12. #6 Vulnerable and Outdated Components This video explains the A06: 2021 - vulnerable and outdated components. |
13. #6 Vulnerable and Outdated Components Prevention This video explains how to prevent vulnerable and outdated components from becoming an issue. |
14. #7 Identification and Authentication Failures This video explains OWASP 07 - identification and authentication failures. |
15. #7 Identification and Authentication Failures Prevention This video explains how to prevent identification and authentication failures. |
16. #8 Software and Data Integrity Failures This video explains A08: 2021 - software and data integrity failures. |
17. Software and Data Integrity Failures Prevention This video explains how we can prevent software and data integrity failures. |
18. #9 Security Logging and Monitoring Failures This video explains OWASP 09 - security logging and monitoring failures. |
19. #9 Security Logging and Monitoring Failures Prevention This video explains the steps to prevent security logging and monitoring failures. |
20. #10 Server-Side Request Forgery This video explains A10: 2021 - Server-Side Request Forgery (SSRF). |
21. #10 Server-Side Request Forgery Prevention This video explains the prevention of Server-Side Request Forgery. |
3. OWASP Top 10 API Security Risks - 2023
1. Conclusion This video wraps up the course on OWASP Top 10. |