This course aims to teach learners about the OWASP top 10 in bite size modules, we will look at the OWASP top 10 vulnerabilities and mitigations available to any development environment.
It is important to understand that this is the baseline set of security standards. Remembering that this knowledge can be reused across technology stacks.
Experience with Linux command line is advantageous however it is not essential as the instructor will guide the delegates through each task.
Delegates will learn how to;
OWASP Top Ten Overview
Our 101 course takes the learner through the OWASP Top Ten. Each issue is introduced, practical examples are given using our application security labs to show the potential impact, whilst countermeasures and secure coding techniques are discussed. We cover the following topics;
A1 – Injection
A2 – Broken Authentication
A3 – Sensitive Data Exposure
A4 – XML External Entities (XXE)
A5 – Broken Access Control
A6 – Security Misconfiguration
A7 – Cross-Site Scripting (XSS)
A8 – Insecure Deserialization
A9 – Using Components with Known Vulnerabilities
A10 – Insufficient Logging & Monitoring
In this short 101 course you will be introduced to the OWASP Top Ten labs, providing a live demonstration of some of the OWASP Top Ten vulnerabilities.
Delegates can also try some of the exploits in these specific labs.
Join our public courses in our Istanbul, London and Ankara facilities. Private class trainings will be organized at the location of your preference, according to your schedule.