OWASP Top 10 - Risks 6-10


In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.

Certificate Available ✔

Get Started / More Info
OWASP Top 10 - Risks 6-10
More Computer Security and Networks Courses

Blockchain Para a Empresa


Blockchain se posiciona na transformação de toda a indústria e das funções administrativas - redefinindo a maneira como transacionamos online, compartilhamos...

Google Workspace Administration 日本語版

Google Cloud

Google Workspace Administration 専門講座は、組織の管理者が Google Workspace のベストプラクティスを確立して管理するための基礎をマスターできるように作られています。\n\nこの講座で受講者は、新しい...

Assets, Threats, and Vulnerabilities


This is the fifth course in the Google Cybersecurity Certificate. These courses will equip you with the skills you need to apply for an entry-level cybersecurity...

Cybersecurity Capstone Project

University of Maryland, College Park

This course presents an intensive experience during which students build a software system they intend to be secure, and then attempt to show that other students'...