Description: OWASP Top 10 list items 10 and 9 are exploits of APIs and components of web applications.

Target Audience: Individuals who wish to increase their knowledge in the field of web application security and common exploits used against web applications

Duration: 00:56

Description: OWASP Top 10 list items 5 and 1 cover security misconfigurations and injection, two highly common attacks in modern web applications

Target Audience: Individuals who wish to increase their knowledge in the field of web application security and common exploits used against web applications

Duration: 01:15

Description: OWASP Top 10 list items 4 and 2 involve applications with broken access controls and broken authentication and session management.

Target Audience: Individuals who wish to increase their knowledge in the field of web application security and common exploits used against web applications

Duration: 01:14

Description: OWASP Top 10 list items 7 and 6 involve applications that expose sensitive data and are not protected from modern attacks.

Target Audience: Individuals who wish to increase their knowledge in the field of web application security and common exploits used against web applications

Duration: 01:09

Description: OWASP Top 10 list items 8 and 3 include cross-site attacks, which are very common exploits in modern web applications.

Target Audience: Individuals who wish to increase their knowledge in the field of web application security and common exploits used against web applications

Duration: 00:54

Description: This course provides a general overview of the OWASP Top 10 list items.

Target Audience: Individuals who wish to increase their knowledge in the field of web application security and common exploits used against web applications

Duration: 01:09

Description: In this course, you'll learn who OWASP is, what they do, and what the OWASP Top 10 list represents.

Target Audience: Individuals who wish to increase their knowledge in the field of web application security and common exploits used against web applications

Duration: 00:59