An Introduction to OWASP Top 10 Vulnerabilities
- A basic understanding of programming
The purpose of this course is to provide students with a fundamental understanding of computer security, through the study of the top 10 most common security vulnerabilities, as provided by OWASP.
By the end of this course, students will have enough of an understanding to make design choices that preserve the security of the applications they own. This course can also serve as a way to gain foundations required to proceed to more advanced security topics.
- Beginner programmers and security researchers looking to learn about computer security
- A1 - SQL Injection
- A1 - Command Injection
- A2 - Broken Authentication
- A3 - Sensitive Data Exposure
- A4 - XML External Entities (XXE)
- A5 - Broken Access Control
- A6 - Security Misconfiguration
- A7 - Cross Site Scripting (XSS)
- A8 - Insecure Deserialization
- A9 - Using Components with Known Vulnerabilities
- A10 - Insufficient Logging & Monitoring
Hi, my name is Scott, and I am a developer and teacher who is passionate about learning. I work primarily in software development and computer security. Aside from this, I've taught students a variety of programming-related topics, and I love to inspire students to be passionate about the topics I teach. I have experience in both large class and one on one teaching, so I have the skills and experience to help you understand and succeed in the topics I teach!
I believe that mathematics and computer science can be approachable and fun topics. I tailor my courses so that they are easy to comprehend, with exploration of the what, why, and how of every topic. I understand that these topics are not a spectator sport, so I provide as many examples and practice problems as possible so that you can follow along and learn!
I look forward to having the opportunity to work with you, and I hope that you enjoy my classes.