The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications and has become such an important cyber security resource today.
Unlike other courses that take a lazy approach to describe these security risks, this course analyzes each vulnerability in sufficient detail by describing what exactly the vulnerabilities are. The OWASP top 10 vulnerabilities explained in detail are Broken Access Control, Cryptographic Failures, SQL Injection Attacks, Cross Site Scripting Attacks, Insecure Design, Security Misconfiguration, Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery. We will discuss how they are exploited by attackers and how they can be prevented. We will also look at real-world cases and scenarios where such vulnerabilities have been exploited.
We will also make use of some third-party applications to try out some of these security risks and see how they are exploited in a real cyber-attack. By the end of the course, you will be able to protect your web applications from various vulnerability attacks.
All resources are placed here: https://github.com/PacktPublishing/A-Detailed-Guide-to-the-OWASP-Top-10
Understand broken access control and its prevention
Understand cryptographic failures and their prevention
Understand SQL injection attacks
Understand cross-site scripting attacks
Understand security misconfiguration and its prevention
Understand server-side request forgery and its prevention