Learn critical web application security risks including authentication failures, outdated components, and server-side request forgery (SSRF).
Learn critical web application security risks including authentication failures, outdated components, and server-side request forgery (SSRF).
This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full OWASP Top 10 - 2021 Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.
4.6
(53 ratings)
2,318 already enrolled
Instructors:
English
Not specified
What you'll learn
Identify and mitigate vulnerable components in applications
Implement secure authentication and identification systems
Prevent software and data integrity failures
Establish effective security logging and monitoring
Protect against server-side request forgery attacks
Skills you'll gain
This course includes:
2.6 Hours PreRecorded video
1 quiz
Access on Mobile, Tablet, Desktop
FullTime access
Shareable certificate
Top companies offer this course to their employees
Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.





There are 5 modules in this course
This comprehensive course covers the final five risks from the OWASP Top 10 2021 list. Students learn about vulnerable and outdated components, identification and authentication failures, software and data integrity failures, security logging and monitoring failures, and server-side request forgery (SSRF). The course uses demonstrations, graphics, and real-world examples to illustrate these critical security concepts and their practical implications.
Vulnerable and Outdated Components
Module 1 · 37 Minutes to complete
Identification and Authentication Failures
Module 2 · 34 Minutes to complete
Software and Data Integrity Failures
Module 3 · 27 Minutes to complete
Security Logging and Monitoring Failures
Module 4 · 32 Minutes to complete
Server-Side Request Forgery (SSRF)
Module 5 · 54 Minutes to complete
Fee Structure
Instructor
Expert in OWASP Top 10 Vulnerabilities at Infosec
John Wagnon is an instructor at Infosec who teaches several courses focused on the OWASP Top 10 vulnerabilities, which are critical for developing secure web applications. His course titled "OWASP Top 10 - Welcome and Risks 1-5" covers the first five risks on the list: Broken Access Control, Cryptographic Failures, Injection, Insecure Design, and Security Misconfiguration. In this course, John explains each vulnerability in detail, discussing their impacts, providing real-world examples, and sharing best practices for mitigation. Emphasizing secure coding practices, proper configuration management, and robust access control mechanisms, he equips students with essential skills to tackle these vulnerabilities.
Testimonials
Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.
4.6 course rating
53 ratings
Frequently asked questions
Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.