Secure Coding Fundamentals (OWASP)

Provided by

Enquire about this course

Overview

This course aims to teach learners about the OWASP top 10 in bite size modules, we will look at the OWASP top 10 vulnerabilities and mitigations available to any development environment. We can also teach this course over a shorter period as a facilitated 4hr workshop, focused on the specific topics of interest.

It is important to understand that this is the baseline set of security standards. Remembering that this knowledge can be reused across technology stacks.
  • Broken Access Controls
  • Cryptographic Failures
  • Injection
  • Insecure Design
  • Security Misconfiguration
  • Vulnerable and Outdated Components
  • Identification and Authentication Failures
  • Software and Data Integrity Failures
  • Security Logging and Monitoring Failures
  • Server-Side Request Forgery (SSRF)
Prerequisites

There are no prerequisites for this course.

Delegates will learn how to
  • Identify the OWASP Top 10 Vulnerabilities
  • Explain how these vulnerabilities could be exploited
  • Outline potential impact and consequences of web-based attacks
  • Describe baseline mitigation steps and techniques to prevent common web and application-based attacks
Outline

OWASP Top Ten Overview

Our course takes the learner through the OWASP Top Ten. Each issue is introduced, practical examples are given using our application security labs to show the potential impact, whilst countermeasures and secure coding techniques are discussed. We cover the following topics;
  • Broken Access Controls
  • Cryptographic Failures
  • Injection
  • Insecure Design
  • Security Misconfiguration
  • Vulnerable and Outdated Components
  • Identification and Authentication Failures
  • Software and Data Integrity Failures
  • Security Logging and Monitoring Failures
  • Server-Side Request Forgery (SSRF)
  • In this short secure coding fundamentals course you will be introduced to the OWASP Top Ten labs, providing a live demonstration of some of the OWASP Top Ten vulnerabilities.
Delegates can also try some of the exploits in these specific labs.
  • Broken Access Controls (Broken Authentication)
  • Injection
  • Security Misconfiguration
  • Server-Side Request Forgery (SSRF)

Enquire

Start date Location / delivery
10 May 2023 QA On-Line Virtual Centre, Virtual Book now
01132207150 01132207150

Related article

The Cyber Pulse is QA's new portal to free Cyber content, including on-demand webinars, articles written by leading experts,