The OWASP top 10, mobile top 10 and API 10 demystified - A guide for pentesters, bug bounty hunters and managers
A practical guide for ethical hackers, developers and software testers to the 10 most prevalent security defects of 2017
What you'll learn
The top 10 web vulnerabilities of 2017
The OWASP top 10 in an understandable manner
How to ethically check and implement defences against the OWASP top 10
Who is this course for?
This course is for everyone who needs to work with the OWASP top 10 but found the guide made by OWASP hard to apply or understand like me i have created this course after performing deep research on all the mentioned topics and learning how to apply these techniques. On several topics we will provide hack-a-long video's to make the topics covered visual which allows for a better understanding and it makes it so that you don't need an extreme level of knowledge to get started with this wonderful list.
Even though we have done everything in our power to make this course as beginner friendly, a basic understanding of web applications such HTTP(s) methods such as GET and POST and what is meant by a parameter.
Contents
- A video and PDF covering every topic in the OWASP top 10 as seen from the perspective of testers, developers and managers
- Extra content on several topics where applicable
- Hack along demo video's demonstrating several vulnerability types where applicable
Who this course is for:
Developers who want to learn how bad actors attack their code so they can protect it
Ethical hackers who want to improve their repetoire
Managers who want to gain an understanding of how bad actors attack their application
Your Instructor
I am the XSS Rat, an experienced ethical hacker who stands for quality and who believes knowledge is a building block we can all use to grow bigger than we ever were. As a software test i have a unique skill set that centers around logic flaws and IDORs which i have not seen very much by other hunters. This gives me the advantage of finding less duplicates and maximizing my chance of finding a vulnerability by picking the correct target and applying the correct test strategy.
Course Curriculum
Getting Help
Available in
days
days
after you enroll
OWASP top 10 - Protection against .. as a developer
Available in
days
days
after you enroll
OWASP top 10 of 2021 - Theory
Available in
days
days
after you enroll
-
StartOWASP Top 10 Intro.mkv (1:54)
-
StartIntroduction 186e7.pdf
-
StartOWASP Top 10 - 2021, Changes
-
StartA01-2021 BAC.mkv (15:01)
-
StartA01 - 2021 dcf17.pdf
-
StartA02-2022 Sensitive data exposure.mkv (6:46)
-
StartA02-2021 103f7.pdf
-
StartA03-2022 Injections.mkv (2:21)
-
StartA03 - 2021 9a4c8.pdf
-
StartA04-2022 Insecure design.mkv (1:43)
-
StartA04-2021 08d43.pdf
-
StartA05-2022 Security Misconfiguration.mkv (4:06)
-
StartA05-2021 9eb03.pdf
-
StartA06 - 2021 Vulnerable and Outdated Components (2:45)
-
StartA06-2021 bd95a.pdf
-
StartA07 - 2021 Identification and Authentication (7:45)
-
StartA07 -2021 .pdf
-
StartA08 - 2021 Software and Data Integrity (1:25)
-
StartA08-2021 d0c0e.pdf
-
StartA09 - 2021 Security Logging and Monitoring (6:50)
-
StartA09-2021 8b2ff.pdf
-
StartA10 - 2021 SSRF (Server side request ... (2:33)
-
StartAl0 - 2021 727b9.pdf
-
StartOWASP Top 10 Course In Under 30 Minutes - With Labs You Can Solve (20:23)
Frequently Asked Questions
When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.