Introduction to OWASP and the Top 10
Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level
Overview/Description
The Open Web Application Security (OWASP) Project is an initiative to track and report on the most prevalent and most dangerous web application exploits. This course introduces the OWASP project and its Top 10 list and then examines each one in action and shows how to identify each of these Top 10 threats. This course is one of a series in the SkillSoft learning path that covers the OWASP Top 10.
Target Audience
Developers wanting to learn about the OWASP Top 10.
Prerequisites
None
Expected Duration (hours)
1.5
Lesson Objectives Introduction to OWASP and the Top 10
start the course
describe the history of the OWASP Project
describe the OWASP Top 10 list and recognize its patterns in your own applications
describe how the A1 exploit works in practice
identify what the A1 exploit relies on to work
describe how the A2 exploit works in practice
identify what the A2 exploit relies on to work
describe how the A3 exploit works in practice
identify what the A3 exploit relies on to work
describe how the A4 exploit works in practice
identify what the A4 exploit relies on to work
describe how the A5 exploit works in practice
identify what the A5 exploit relies on to work
describe how the A6 exploit works in practice
identify what the A6 exploit relies on to work
describe how the A7 exploit works in practice
identify what the A7 exploit relies on to work
describe how the A8 exploit works in practice
identify what the A8 exploit relies on to work
describe how the A9 exploit works in practice
identify what the A9 exploit relies on to work
describe how the A10 exploit works in practice
identify what the A10 exploit relies on to work
compare authentication and authorization
define the Defense in Depth principle
identify the OWASP Top 10 exploits in a real-world scenario
Course Number: sp_owsp_a01_it_enus
Expertise Level
Beginner