OWASP Top 10 describes the ten biggest software vulnerabilities. In this learning path, you can take a deep dive into each category, examining real-world examples that demonstrate how companies and consumers alike are affected, and learn techniques that can help you prevent these types of attacks.
-
Identify the vulnerabilities that make up the OWASP Top 10.
-
Learn how to prevent common software vulnerabilities.
-
Find out how to enhance software security.
Courses
-
1
Learning the OWASP Top 1035mLearning the OWASP Top 10
By: Caroline Wong
Explore the ten most critical software vulnerabilities for 2021, as described by the Open Web Application Security Project (OWASP).
-
2
OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures29mOWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures
By: Caroline Wong
Learn about broken access control and cryptographic failures, the first two security vulnerabilities listed on the 2021 OWASP Top 10.
-
3
OWASP Top 10: #3 Injection and #4 Insecure Design32mOWASP Top 10: #3 Injection and #4 Insecure Design
By: Caroline Wong
Get an overview of the #3 and #4 top software vulnerabilities—injection and insecure design—described in the 2021 OWASP Top 10.
-
4
OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components33mOWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components
By: Caroline Wong
Learn about security misconfiguration and vulnerable and outdated components, the fifth and sixth most important security vulnerabilities listed on the 2021 OWASP Top 10.
-
5
OWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures40mOWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures
By: Caroline Wong
Prepare for the seventh and eighth most common vulnerabilities on the 2021 OWASP Top 10 List: identity and authentication failures, and software and data integrity failures.
-
6
OWASP Top 10: #9 Security Logging and Monitoring Failures and #10 Server-Side Request Forgery38mOWASP Top 10: #9 Security Logging and Monitoring Failures and #10 Server-Side Request Forgery
By: Caroline Wong
Prepare for the ninth and tenth most common vulnerabilities on the 2021 OWASP Top 10 List: security logging and monitoring failures and server-side request forgery.