Course Contents
PHASE 1: INTRODUCTION TO OWASP AND WEB APPLICATION SECURITY
- The importance of web application security
- Introduction to OWASP and the Top 10 project
- Overview of the 2021 Top 10 web application security risks
PHASE 2: IN-DEPTH ANALYSIS OF OWASP TOP 10 RISKS (PART 1)
- A01: Broken Access Control
- A02: Cryptographic Failures
- A03: Injection (including Cross-SiteScripting)
PHASE 3: HANDS-ON WORKSHOP
- Practical exercises on identifying and mitigating risks from Phase 2
PHASE 4: IN-DEPTH ANALYSIS OF OWASP TOP 10 RISKS (PART 2)
- A04: Insecure Design
- A05: Security Misconfiguration (including XML External Entities)
- A06: Vulnerable and Outdated Components
PHASE 5: HANDS-ON WORKSHOP
- Practical exercises on identifying and mitigating risks from Phase 4
PHASE 6: IN-DEPTH ANALYSIS OF OWASP TOP 10 RISKS (PART 3) AND MITIGATION STRATEGIES
- A07: Identification and Authentication Failures
- A08: Software and Data Integrity Failures (including Insecure Deserialization)
- A09: Security Logging and Monitoring Failures
- A10: Server-Side Request Forgery
- Secure coding practices to mitigate risks
- Introduction to security tools and technologies
- Security testing methodologies
PHASE 7: HANDS-ON WORKSHOP
- Practical exercises on identifying and mitigating risks from Phase 6
PHASE 8: CREATING A SECURE DEVELOPMENT LIFECYCLE (SDLC)
- Integrating security into the SDLC
- Ongoing security education for development teams