OWASP Top 10 - Risks 6-10



OWASP Top 10 - Risks 6-10

OWASP Top 10 - Risks 6-10


In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.


None


Syllabus

Syllabus - What you will learn from this course
Week 1
Vulnerable and Outdated Components
Week 2 …

Duration Course 2 of 3 in the
Start your Free Trial

Self paced

Rating out of 5 ( in Coursera)

Go to the Course
We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.