Exploring the OWASP Top Ten is a seminar style course designed for web developers and technical stakeholders who need to produce secure web applications using the most up to date OWASP standards. Our web app security expert will share how to integrate security measures into the development process. You will also explore core concepts and challenges in web application security, showcasing real world examples that illustrate the potential consequences of not following these best practices.
This course will walk you through how to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. You will explore most common security vulnerabilities faced by web applications today, examining each vulnerability from a coding perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing and implementing effective defenses.
Guided by our application security expert, you will explore how to:
Need different skills or topics? If your team requires different topics or tools, additional skills or custom approach, this course may be further adjusted to accommodate. We offer a wide variety of application security, programming and other related topics that may be blended with this course for a track that best suits your needs. Our team can help design the course or learning path that best meets your needs and skills goals.
This course will walk you through how to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. You will explore most common security vulnerabilities faced by web applications today, examining each vulnerability from a coding perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing and implementing effective defenses.
Guided by our application security expert, you will explore how to:
Need different skills or topics? If your team requires different topics or tools, additional skills or custom approach, this course may be further adjusted to accommodate. We offer a wide variety of application security, programming and other related topics that may be blended with this course for a track that best suits your needs. Our team can help design the course or learning path that best meets your needs and skills goals.
Need different skills or topics? If your team requires different topics or tools, additional skills or custom approach, this course may be further adjusted to accommodate. We offer additional .Net programming, secure coding, development, hacking, database security, bug hunting and other related topics that may be blended with this course for a track that best suits your needs. Our team will collaborate with you to understand your needs and will target the course to focus on your specific learning objectives and goals.
This is an overview-level , lecture and demonstration style course, designed to provide technical application project stakeholders with a first-look or baseline understanding of how to develop well defended web applications. Real-world programming experience is highly recommended for code reviews, but not required.
Please see the Related Courses Tab for Pre-Requisite course specifics and links, links to similar courses you might review as an alternative, as well as suggested Next-Step Follow-On Courses and Learning Path recommendations.
Please note that this list of topics is based on our standard course offering, evolved from typical industry uses and trends. We’ll work with you to tune this course and level of coverage to target the skills you need most. Topics, agenda and labs are subject to change, and may adjust during live delivery based on audience interests, skill-level and participation.
Session: Jumping into the 2021 OWASP Top 10
Lesson: Why Hunt Bugs?
Lesson: Safe and Appropriate Bug Hunting/Hacking
Lesson: Removing Bugs
Session: Bug Stomping 101
Lesson: Unvalidated Data
Lesson: A01: Broken Access Control
Lesson: A02: Cryptographic Failures
Lesson: A03: Injection
Lesson: A04: Insecure Design
Lesson: A05: Security Misconfiguration
Session: Bug Stomping 102
Lesson: A06: Vulnerable and Outdated Components
Lesson: A07: Identification and Authentication Failures
Lesson: A08: Software and Data Integrity Failures
Lesson: A09: Security Logging and Monitoring Failures
Lesson: A10: Server Side Request Forgeries (SSRF)
Session: Moving Forward
Lesson: Applications: What Next?
Additional Topics: Time Permitting
These topics will be included in your course materials but may or may not be presented during the live class depending on the pace of the course and attendee skill level and participation.
Lesson: SDL Overview
Lesson: SDL In Action
Student Materials: Each participant will receive a digital Student Guide and/or Course Notes, code samples, software tutorials, step-by-step written lab instructions (as applicable), diagrams and related reference materials and resource links. Students will also receive the project files (or code, if applicable) and solutions required for the hands-on work.
Every-Course Extras = High-Value & Long-Term Learning Support! All Public Schedule courses include our unique EveryCourse Extras package (Course Recordings, Live Instructor Follow-on Support, Free *Live* Course Refresh Re-Takes, early access to Special Offers, Free Courses & more). Please inquire for details.
Live scheduled classes are listed below or browse our full course catalog anytime
Check out custom training solutions planned around your unique needs and skills.
Exclusive materials, ongoing support and a free live course refresh with every class.
Learning is Twice as Nice!
Buy One Get One Free!
Enroll by March 31 in any TWO public classes in 2023 for the price of ONE!
Special Offers
Limited Offer for most courses.
SAVE 50%