An Introduction to OWASP Top 10 Vulnerabilities
- A basic understanding of programming
The purpose of this course is to provide students with a fundamental understanding of computer security, through the study of the top 10 most common security vulnerabilities, as provided by OWASP.
By the end of this course, students will have enough of an understanding to make design choices that preserve the security of the applications they own. This course can also serve as a way to gain foundations required to proceed to more advanced security topics.
Who this course is for:
- Beginner programmers and security researchers looking to learn about computer security
- A1 - SQL Injection17:30
- A1 - Command Injection10:20
- A2 - Broken Authentication09:09
- A3 - Sensitive Data Exposure15:12
- A4 - XML External Entities (XXE)23:00
- A5 - Broken Access Control07:13
- A6 - Security Misconfiguration07:05
- A7 - Cross Site Scripting (XSS)13:32
- A8 - Insecure Deserialization06:01
- A9 - Using Components with Known Vulnerabilities07:57
- A10 - Insufficient Logging & Monitoring00:10
Hi, my name is Scott, and I am a developer and teacher who is passionate about learning. I work primarily in software development and computer security. Aside from this, I've taught students a variety of programming-related topics, and I love to inspire students to be passionate about the topics I teach. I have experience in both large class and one on one teaching, so I have the skills and experience to help you understand and succeed in the topics I teach!
I believe that mathematics and computer science can be approachable and fun topics. I tailor my courses so that they are easy to comprehend, with exploration of the what, why, and how of every topic. I understand that these topics are not a spectator sport, so I provide as many examples and practice problems as possible so that you can follow along and learn!
I look forward to having the opportunity to work with you, and I hope that you enjoy my classes.