OWASP TOP 10 - 2013 Risk Vulnerability
A full OWASP top 10 workshop
Your Instructor
Luke Briner is an IT Consultant based in the UK. He specialises in Cyber
Security and Scalable Cloud Systems and is a member of various
community software projects and has previously submitted work to the
OWASP Developers Guide and App Sensor IDS.
Subscribe to Lukes Youtube Channel
Course Curriculum
OWASP TOP 10 Risk Vulnerability
Available in
days
days
after you enroll
-
PreviewOWASP Top 10 - A1 Injection explained (20:59)
-
StartOWASP Top 10 - A2 Broken authentication and session management explained (21:02)
-
StartOWASP Top 10 - A3 XSS explained (22:21)
-
StartOWASP Top 10 - A4 Insecure direct object references explained (19:31)
-
StartOWASP Top 10 - A5 Security misconfiguration explained (21:53)
-
StartOWASP Top 10 - A6 Sensitive data exposure explained (27:18)
-
StartOWASP Top 10 - A7 Missing function-level access control (15:23)
-
StartOWASP Top 10 - A8 Cross site request forgery (CSRF) explained (19:05)
-
StartOWASP Top 10 - A9 Components with known vulnerabilities (12:55)
-
StartOWASP Top 10 - A10 Unvalidated redirects and forwards (13:16)
Frequently Asked Questions
When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.