Course Overview

This learning path covers OWASP Top 10, application security best practices, vulnerability assessments, container security, Kubernetes hardening, and security automation. Learn to secure enterprise environments, integrate security into SDLC, and defend against modern cyber threats with practical labs and tools.

What You Will Learn

  • Identify and mitigate OWASP Top 10 vulnerabilities.
  • Perform security testing with OWASP ZAP and BurpSuite.
  • Harden Docker containers and Kubernetes environments.
  • Implement security monitoring and incident response.

Program Curriculum

Content
  • Chapter 1: Welcome!
  • Chapter 2: Introduction to OWASP Top 10 and More Terms
  • Chapter 3: Dive into the OWASP Top 10
  • Chapter 4: Defenses and Tools
  • Chapter 5: Session Management
  • Chapter 6: Risk Rating and Threat Modeling
  • Chapter 7: Encryption and Hashing
  • Chapter 8: Frameworks and Process
  • Chapter 9: Security Scanning and Testing
  • Chapter 10: Conclusion

Content
  • Chapter 1: World Wide Web Fundamentals
  • Chapter 2: Injection Flaws
  • Chapter 3: Broken Authentication
  • Chapter 4: Sensitive Data Exposure
  • Chapter 5: XML External Entities
  • Chapter 6: Broken Access Control
  • Chapter 7: Security Misconfiguration
  • Chapter 8: Cross-Site Scripting (XSS)
  • Chapter 9: Insecure Deserialization
  • Chapter 10: Using Components with Known Vulnerabilities
  • Chapter 11: Insufficient Logging & Monitoring
  • Chapter 12: What Has Changed in OWASP 2021?
  • Chapter 13: Server-side Request Forgery​ (SSRF)

Content
  • Chapter 1: Welcome and Introduction to Web Security
  • Chapter 2: Structure of Modern Web Applications
  • Chapter 3: Web Information Gathering
  • Chapter 4: Security For Injection Vulnerability
  • Chapter 5: Security For Broken Authentication Vulnerability
  • Chapter 6: Security For Sensitive Data Exposure
  • Chapter 7: Security For XML External Entity (XXE) Vulnerability

Content
  • Chapter 1: Introduction
  • Chapter 2: Host OS Vulnerabilities
  • Chapter 3: Insecure Container Images
  • Chapter 4: Insecure Container Configurations
  • Chapter 5: Container Escape Vulnerabilities
  • Chapter 6: Inadequate Process Isolation
  • Chapter 7: Inadequate Network Segmentation
  • Chapter 8: Inadequate Logging and Monitoring
  • Chapter 9: Insecure Data Storage in Containers
  • Chapter 10: Mounting Docker Socket
  • Chapter 11: Inadequate Resource Limits
  • Chapter 12: Inadequate Security Controls
  • Chapter 13: Introduction to OWASP Kubernetes Top 10
  • Chapter 14: Insecure Workload Configurations
  • Chapter 15: Supply Chain Vulnerabilities
  • Chapter 16: Overly Permissive RBAC Configurations
  • Chapter 17: Lack of Centralized Policy Enforcement
  • Chapter 18: Inadequate Logging and Monitoring

Content
  • Chapter 1: Security for Broken Access Control Vulnerability
  • Chapter 2: Security for Security Misconfiguration Vulnerability
  • Chapter 3: Security for Cross Site Scripting (XSS) Vulnerability
  • Chapter 4: Security for Insecure Deserialization Vulnerability
  • Chapter 5: Security for Using Component With Known Vulnerabilities
  • Chapter 6: Security for Insufficient Logging and Monitoring Vulnerability
  • Chapter 7: Web Security Automated Tools
Load more modules

Instructor

Sunil Gupta

A computer programmer and cybersecurity expert, Sunil Gupta consults in information technology with a focus on cybersecurity. He is an invited speaker for and a member of many key organizations. Sunil is a technology visionary and cybersecurity professional who thrives on solving complex problems. His career highlights include working with various companies, organizations and products. He is passionate about customer service and his role as a cybersecurity expert, and always exceeds his clients’ expectations. Sunil performs leading-edge security consulting and works in research and development as a security expert to advance the state of the art in information systems security.

Sunil Gupta

A computer programmer and cybersecurity expert, Sunil Gupta consults in information technology with a focus on cybersecurity. He is an invited speaker for and a member of many key organizations. Sunil is a technology visionary and cybersecurity professional who thrives on solving complex problems. His career highlights include working with various companies, organizations and products. He is passionate about customer service and his role as a cybersecurity expert, and always exceeds his clients’ expectations. Sunil performs leading-edge security consulting and works in research and development as a security expert to advance the state of the art in information systems security.

Paulo Silva Silva

Paulo Silva holds a bachelor’s degree in computer science and a master in Innovation and Technological Entrepreneurship. With more than 15 years professional experience as software developer, in the last 6 years he has been completely focused on security. Nowadays he is an independent senior security researcher, collaborating with several organizations to find and fix security weaknesses in their systems.

Since 2010 Paulo is OWASP’s volunteer contributing to several projects such as the OWASP Top 10 and OWASP API Security Top 10 in which he is the main contributor. He’s also the OWASP Go Secure Coding Practices project leader.

Used to attend security conferences all over the world, Paulo is frequently invited to deliver awareness and security training in the academia. He has also authored several security articles and secure programming guides.

Derek Fisher

As a security leader he has worn many hats. Some days he is mentoring junior security people, other days he is diving into architecture to find common ground that provides the engineering team the solution they are striving for while ensuring the organization is secure. In between these interactions he delivers security talks, teach security at the university level, lead an international team, and spend time writing on the topic of security. Over the years he has had the pleasure of working in multiple organizations from several different industries. He has had experience in hardware and software engineering prior to starting this journey in security. This broad background is used to support organizational goals while doing so in a way that reduces risk.

A. Enes Turan

Enes is a Certified Professional Cloud Architect and Kubernetes enthusiast with several years of experience working with DevOps, container orchestration, and platform engineering. He has helped multiple organizations implement DevOps practices and improve the reliability and scalability of their applications on Kubernetes. He also has experience in designing and implementing cloud infrastructure and has a deep understanding of best practices for cloud security, compliance, and governance. He has a strong passion for sharing his knowledge with others and helping them to be successful with DevOps, Kubernetes, and Cloud Architecture.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering video-based learning with 840+ courses and diverse Learning Paths to enhance your skills.

$ 69.00
Billed monthly or $599.00 billed annually

What is included

  • 840+ Premium Short Courses
  • 70+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs and CTF Challenges for comprehensive skill-building.

$ 79.00
Billed monthly or $699.00 billed annually

Everything in Pro and

  • 1400+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month

Related Learning Paths

1 of 50

Quick View

Web Security for Cybersecurity Engineers

Skip to product information
1 of 1
What's included
  • Full Video Access
  • Self-Paced Study Guide
  • 6 months of access to virtual labs
  • Once redeemed, this bundle will be valid for 12 months
  • Self-Paced Study Guide
  • Exam Voucher + Retake
View full details

Web Security for Cybersecurity Engineers

Web Security for Cybersecurity Engineers