Course Details

Previous Page


Introduction to OWASP and the Top 10


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
The Open Web Application Security (OWASP) Project is an initiative to track and report on the most prevalent and most dangerous web application exploits. This course introduces the OWASP project and its Top 10 list and then examines each one in action and shows how to identify each of these Top 10 threats. This course is one of a series in the SkillSoft learning path that covers the OWASP Top 10.

Target Audience
Developers wanting to learn about the OWASP Top 10.

Prerequisites
None

Expected Duration (hours)
1.5

Lesson Objectives

Introduction to OWASP and the Top 10

  • start the course
  • describe the history of the OWASP Project
  • describe the OWASP Top 10 list and recognize its patterns in your own applications
  • describe how the A1 exploit works in practice
  • identify what the A1 exploit relies on to work
  • describe how the A2 exploit works in practice
  • identify what the A2 exploit relies on to work
  • describe how the A3 exploit works in practice
  • identify what the A3 exploit relies on to work
  • describe how the A4 exploit works in practice
  • identify what the A4 exploit relies on to work
  • describe how the A5 exploit works in practice
  • identify what the A5 exploit relies on to work
  • describe how the A6 exploit works in practice
  • identify what the A6 exploit relies on to work
  • describe how the A7 exploit works in practice
  • identify what the A7 exploit relies on to work
  • describe how the A8 exploit works in practice
  • identify what the A8 exploit relies on to work
  • describe how the A9 exploit works in practice
  • identify what the A9 exploit relies on to work
  • describe how the A10 exploit works in practice
  • identify what the A10 exploit relies on to work
  • compare authentication and authorization
  • define the Defense in Depth principle
  • identify the OWASP Top 10 exploits in a real-world scenario
  • Course Number:
    sp_owsp_a01_it_enus