Home
Learn More
Log In
Course Content
Expand All
|
Collapse All
Lessons
Status
1
Introduction to OWASP 2025
2
Injection
How to Prevent – Injection
Example Scenarios – Injection
More Resources – Injection
3
Broken Authentication
How to Prevent – Broken Authentication
Example Scenarios – Broken Authentication
More Resources – Broken Authentication
4
Sensitive Data Exposure
How to Prevent – Sensitive Data Exposure
Example Scenarios – Sensitive Data Exposure
More Resources – Sensitive Data Exposure
5
XML External Entities (XXE)
How to Prevent – XML External Entities (XXE)
Example Scenarios – XML External Entities (XXE)
More Resources – XML External Entities (XXE)
6
Broken Access Control
How to Prevent – Broken Access Control
Example Scenarios – Broken Access Control
More Resources – Broken Access Control
7
Security Misconfiguration
How to Prevent – Security Misconfiguration
Example Scenarios – Security Misconfiguration
More Resources – Security Misconfiguration
8
Cross Site Scripting (XXS)
How to Prevent – Cross Site Scripting (XXS)
Example Scenario – Cross Site Scripting (XXS)
More Resources – Cross Site Scripting (XXS)
9
Insecure Deserialization
How to Prevent – Insecure Deserialization
Example Scenarios – Insecure Deserialization
More Resources – Insecure Deserialization
10
Using Components With Known Vulnerabilities
How to Prevent – Using Components With Known Vulnerabilities
Example Scenarios – Using Components With Known Vulnerabilities
More Resources – Using Components With Known Vulnerabilities
11
Insufficient Logging And Monitoring
How to Prevent – Insufficient Logging And Monitoring
Example Scenarios – Insufficient Logging And Monitoring
More Resources – Insufficient Logging And Monitoring
12
OWASP Conclusion
2018 OWASP Top 10 PCI Training
This course will give you an overview of the top IT threats facing Prepaid Program Managers today.
Course Content
Expand All
|
Collapse All
Lessons
Status
1
Introduction to OWASP 2025
2
Injection
How to Prevent – Injection
Example Scenarios – Injection
More Resources – Injection
3
Broken Authentication
How to Prevent – Broken Authentication
Example Scenarios – Broken Authentication
More Resources – Broken Authentication
4
Sensitive Data Exposure
How to Prevent – Sensitive Data Exposure
Example Scenarios – Sensitive Data Exposure
More Resources – Sensitive Data Exposure
5
XML External Entities (XXE)
How to Prevent – XML External Entities (XXE)
Example Scenarios – XML External Entities (XXE)
More Resources – XML External Entities (XXE)
6
Broken Access Control
How to Prevent – Broken Access Control
Example Scenarios – Broken Access Control
More Resources – Broken Access Control
7
Security Misconfiguration
How to Prevent – Security Misconfiguration
Example Scenarios – Security Misconfiguration
More Resources – Security Misconfiguration
8
Cross Site Scripting (XXS)
How to Prevent – Cross Site Scripting (XXS)
Example Scenario – Cross Site Scripting (XXS)
More Resources – Cross Site Scripting (XXS)
9
Insecure Deserialization
How to Prevent – Insecure Deserialization
Example Scenarios – Insecure Deserialization
More Resources – Insecure Deserialization
10
Using Components With Known Vulnerabilities
How to Prevent – Using Components With Known Vulnerabilities
Example Scenarios – Using Components With Known Vulnerabilities
More Resources – Using Components With Known Vulnerabilities
11
Insufficient Logging And Monitoring
How to Prevent – Insufficient Logging And Monitoring
Example Scenarios – Insufficient Logging And Monitoring
More Resources – Insufficient Logging And Monitoring
12
OWASP Conclusion