Course Overview

Master the essential skills to mitigate the top 10 web application security risks effectively. This learning path will get the customers introduced to OWASP which will help minimize security risks against applications. Learners will also understand the top 10 vulnerabilities in Docker and Kubernetes environments, while they'll also perform penetration testing activities using OWASP ZAP.

What You Will Learn

  • Explore injection vulnerabilities
  • Understand broken authentication
  • Learn to use the OWASP Top 10 to ensure your applications minimize the security risks in the list
  • Understand common exploitation techniques used to test software security
  • Learn how to ethically check and implement defenses against the OWASP top 10
  • Learn how to secure container images and prevent supply chain attacks
  • Understand the complete layout of OWASP ZAP.

Program Curriculum

Content
  • Chapter 1: Introduction
  • Chapter 2: Host OS Vulnerabilities
  • Chapter 3: Insecure Container Images
  • Chapter 4: Insecure Container Configurations
  • Chapter 5: Container Escape Vulnerabilities
  • Chapter 6: Inadequate Process Isolation
  • Chapter 7: Inadequate Network S

Content
  • Chapter 1: World Wide Web Fundamentals
  • Chapter 2: Injection Flaws
  • Chapter 3: Broken Authentication
  • Chapter 4: Sensitive Data Exposure
  • Chapter 5: XML External Entities
  • Chapter 6: Broken Access Control
  • Chapter 7: Security Misconfiguration
  • Chapter 8: Cross-Si

Content
  • Chapter 1: A1.2017 Injections
  • Chapter 2: A2.2017 Broken Authentication
  • Chapter 3: A3.2017 Sensitive Data Exposure
  • Chapter 4: A4.2017 XXE
  • Chapter 5:A5.2017 Broken Access Control
  • Chapter 6: A6.2017 Security Misconfigurations
  • Chapter 7: A7.2017 XSS7
  • Chapter 8

Content
  • Chapter 1: Introduction and Setup
  • Chapter 2: Configuration and Features
  • Chapter 3: Vulnerability Assessment of Web Applications
  • Chapter 4: Penetration Testing of Web Applications
  • Chapter 5: Reporting

Content

Chapter 1: OWASP Top 10

Load more modules

Instructor

Sunil Gupta

A computer programmer and cybersecurity expert, Sunil Gupta consults in information technology with a focus on cybersecurity. He is an invited speaker for and a member of many key organizations. Sunil is a technology visionary and cybersecurity professional who thrives on solving complex problems. His career highlights include working with various companies, organizations and products. He is passionate about customer service and his role as a cybersecurity expert, and always exceeds his clients’ expectations. Sunil performs leading-edge security consulting and works in research and development as a security expert to advance the state of the art in information systems security.

Paulo Silva Silva

Paulo Silva holds a bachelor’s degree in computer science and a master in Innovation and Technological Entrepreneurship. With more than 15 years professional experience as software developer, in the last 6 years he has been completely focused on security. Nowadays he is an independent senior security researcher, collaborating with several organizations to find and fix security weaknesses in their systems.

Since 2010 Paulo is OWASP’s volunteer contributing to several projects such as the OWASP Top 10 and OWASP API Security Top 10 in which he is the main contributor. He’s also the OWASP Go Secure Coding Practices project leader.

Used to attend security conferences all over the world, Paulo is frequently invited to deliver awareness and security training in the academia. He has also authored several security articles and secure programming guides.

Scott Cosentino

Scott Cosentino is a developer and teacher who is passionate about learning. He works primarily in software development and computer security. Aside from this, he has taught students a variety of programming-related topics, and he loves to inspire students to be passionate about the topics that he teaches. He has experience in both large classes and one on one teaching. Scott believes that mathematics and computer science can be approachable and fun topics. he tailors his courses so that they are easy to comprehend, with an exploration of what, why, and how of every topic. He understands that these topics are not a spectator sport, so he provides as many examples and practises problems as possible so that the viewer can follow along and learn!

Wesley Thijs

He is the XSS Rat, an experienced ethical hacker who stands for quality and who believes knowledge is a building block we can all use to grow bigger than we ever were. As a software test he has a unique skill set that center around logic flaws and IDORs which is not seen very much by other hunters. This gives him the advantage of finding less duplicates and maximizing his chance of finding a vulnerability by picking the correct target and applying the correct test strategy.

A. Enes Turan

Enes is a Certified Professional Cloud Architect and Kubernetes enthusiast with several years of experience working with DevOps, container orchestration, and platform engineering. He has helped multiple organizations implement DevOps practices and improve the reliability and scalability of their applications on Kubernetes. He also has experience in designing and implementing cloud infrastructure and has a deep understanding of best practices for cloud security, compliance, and governance. He has a strong passion for sharing his knowledge with others and helping them to be successful with DevOps, Kubernetes, and Cloud Architecture.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Learning Paths

1 of 8

Quick View

Mastering OWASP Fundamentals

Skip to product information
1 of 1
What's included
  • Full Video Access
  • Self-Paced Study Guide
  • 6 months of access to virtual labs
  • Once redeemed, this bundle will be valid for 12 months
  • Self-Paced Study Guide
  • Exam Voucher + Retake
View full details

Mastering OWASP Fundamentals

Mastering OWASP Fundamentals