Payments Academy Logo
  • Home
  • Learn More
  • Log In

Course Content

Expand All | Collapse All
Lessons Status
1

Introduction to OWASP 2025

2

Broken Access Control – #1 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Broken Access Control

3

Cryptographic Failures – #4 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Cryptographic Failures

4

Injection – #5 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Injection

5

Insecure Design – #6 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Insecure Design

6

Security Misconfiguration – #2 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Security Misconfiguration

7

Software Supply Chain Failures – #3 OWASP Top 10 2025
  • Scenarios-Prevention-Software Supply Chain Failures

8

Authentication Failures – #7 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Identification and Authentication Failures

9

Software and Data Integrity Failures- #8 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Software and Data Integrity Failures

10

Security Logging and Monitoring Failures – #9 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Security Logging and Monitoring Failures

11

Server-Side Request Forgery (SSRF) – #10 OWASP Top 10 2021
  • Scenarios-Prevention-Resources for Server-Side Request Forgery (SSRF)

12

OWASP Conclusion

2021 OWASP Top 10 PCI Training

This course will give you an overview of the top IT threats facing Prepaid Program Managers today.

THIS COURSE IS ONLY FOR IT USERS

Course Content

Expand All | Collapse All
Lessons Status
1

Introduction to OWASP 2025

2

Broken Access Control – #1 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Broken Access Control

3

Cryptographic Failures – #4 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Cryptographic Failures

4

Injection – #5 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Injection

5

Insecure Design – #6 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Insecure Design

6

Security Misconfiguration – #2 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Security Misconfiguration

7

Software Supply Chain Failures – #3 OWASP Top 10 2025
  • Scenarios-Prevention-Software Supply Chain Failures

8

Authentication Failures – #7 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Identification and Authentication Failures

9

Software and Data Integrity Failures- #8 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Software and Data Integrity Failures

10

Security Logging and Monitoring Failures – #9 OWASP Top 10 2025
  • Scenarios-Prevention-Resources for Security Logging and Monitoring Failures

11

Server-Side Request Forgery (SSRF) – #10 OWASP Top 10 2021
  • Scenarios-Prevention-Resources for Server-Side Request Forgery (SSRF)

12

OWASP Conclusion

Copyright 2026 Prepaid Program Management LLC - Privacy Policy