Introduction to OWASP Top 10 Security Risks

By Christopher Jackson

Learn to defend against common web app security risks with the OWASP Top 10.

2 hours
  • 17 Lessons
  • 1 Hands-On Lab
  • 1 Course Quiz

About the course

This course will introduce students to the OWASP organization and their list of the top 10 web application security risks. The course will analyze these risks from the attacker’s perspective and provide defensive techniques to protect against these risks.

  • Chapter 1 3 Lessons Introduction 6:16

    Course Introduction

    1:00

    About the Author

    1:02

    Installing OWASP Juice Shop on a Cloud Playground Server

    4:14
  • Chapter 2 14 Lessons Understanding the OWASP Top 10 1:48:40

    OWASP Top 10 Overview

    2:32

    Insufficient Logging and Monitoring

    4:54

    Using Components with Known Vulnerabilities

    3:15

    Insecure Deserialization

    2:42

    Cross-Site Scripting (XSS)

    4:12

    Security Misconfiguration

    4:31

    Broken Access Control

    3:47

    XML External Entities (XXE)

    3:22

    Sensitive Data Exposure

    2:42

    Broken Authentication

    4:22

    Injection

    4:32

    OWASP Top 10 Summary

    7:49

    Performing SQL Injection and XSS Attacks

    30:00 Hands-On Lab

    QUIZ: Introduction to OWASP Top 10 Security Risks

    30:00 Quiz
  • Chapter 3 1 Lesson Conclusion 1:20

    Conclusion and What’s Next

    1:20

What are Hands-on Labs

What's the difference between theoretical knowledge and real skills? Practical real-world experience. That's where Hands-on Labs come in! Hands-on Labs are guided, interactive experiences that help you learn and practice real-world scenarios in real cloud environments. Hands-on Labs are seamlessly integrated in courses, so you can learn by doing.

Get Started
Who’s going to be learning?
Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!