OWASP Top 10

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

OWASP Top 10

Coursera · Intermediate ·🔐 Cybersecurity ·1mo ago
This course features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Learn how to identify and mitigate the most critical security vulnerabilities in web applications with the OWASP Top 10. This course will walk you through each of the major vulnerabilities outlined in the 2021 OWASP Top 10 list, explaining both the risks and how to address them. By gaining a deep understanding of these vulnerabilities, you'll be better equipped to secure applications and protect user data from cyber threats. Throughout the course, you’ll experience hands-on demonstrations, practical remediation strategies, and real-world application scenarios. Each vulnerability is explored in three key stages: how to exploit it, how to fix it, and how to verify that your solution is effective. You will learn to recognize the dangers of broken access control, cryptographic failures, injection flaws, insecure design, and more, ensuring you can develop secure, robust web applications. This course is ideal for web developers, security professionals, and anyone interested in improving their understanding of web application security. You’ll start by exploring the most common vulnerabilities, then move into strategies for preventing and fixing them, followed by methods for validating the effectiveness of your fixes.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

Stop Storing JWTs in localStorage: A Security Guide for Web Developers
Learn why storing JWTs in localStorage is insecure and how to secure your web application's authentication, which is crucial for protecting user data
Dev.to · Damilola Owolabi
Inside Consumer DVRs — Hardware, Firmware & Network Security Evaluation
Learn about the hardware, firmware, and network security of consumer DVRs through a reverse engineering analysis of the Hikvision DS-7204HUHI-K
Medium · Cybersecurity
Cómo construimos un SOC con honeypot e IA local
Learn how to build a Security Operations Center (SOC) using honeypot and local AI to detect and prevent cyber threats
Dev.to · Yoandy Ramirez Delgado
Credentials in web applications: how to store them properly
Learn how to store credentials properly in web applications to prevent breaches
Dev.to · Ian Johnson
Up next
A single PR just hijacked the NPM registry...
Fireship
Watch →