-
Introduction to OWASP Top 10: This module will provide an overview of the OWASP Top 10 list, and the importance of application security in the current landscape.
-
Broken access controls: This module will cover access control vulnerabilities and how to identify and prevent them.
-
Cryptographic Failures: This module will cover weak or broken algorithms and how to protect data in transit.
-
Injection: This module will focus on Injection flaws such as SQL and OS command injection, and how to identify and prevent them.
-
Insecure Design: This module will cover common design and architectural flaws and how to identify and fix them.
-
Security misconfiguration: This module will cover common security misconfigurations and how to identify and fix them.
-
Vulnerable and Outdated Components: This module will cover the risks associated with using components with known vulnerabilities and how to manage these risks.
-
Identification and Authentication Failures: This module will cover authentication and session management, including password management, session hijacking, and other common vulnerabilities.
-
Software and Data Integrity Failures: This module will focus on code and infrastructure that doesn’t protect against integrity violations.
-
Security Logging and Monitoring Failures: This module will cover the importance of logging and monitoring in detecting and responding to security incidents. Server-side request forgery (SSRF): This module will focus on SSRF vulnerabilities and how to prevent them.