Course Outline

  • Introduction to OWASP Top 10: This module will provide an overview of the OWASP Top 10 list, and the importance of application security in the current landscape.

  • Broken access controls: This module will cover access control vulnerabilities and how to identify and prevent them.

  • Cryptographic Failures: This module will cover weak or broken algorithms and how to protect data in transit.

  • Injection: This module will focus on Injection flaws such as SQL and OS command injection, and how to identify and prevent them.

  • Insecure Design: This module will cover common design and architectural flaws and how to identify and fix them.

  • Security misconfiguration: This module will cover common security misconfigurations and how to identify and fix them.

  • Vulnerable and Outdated Components: This module will cover the risks associated with using components with known vulnerabilities and how to manage these risks.

  • Identification and Authentication Failures: This module will cover authentication and session management, including password management, session hijacking, and other common vulnerabilities.

  • Software and Data Integrity Failures: This module will focus on code and infrastructure that doesn’t protect against integrity violations.

  • Security Logging and Monitoring Failures: This module will cover the importance of logging and monitoring in detecting and responding to security incidents. Server-side request forgery (SSRF): This module will focus on SSRF vulnerabilities and how to prevent them.

Delivery Method and Course Outcome

Theory: Each module consists of an explanation of each risk and multiple practical cases.

Hands-on Labs: Once the instructor has demonstrated the practical application of the concepts, he will perform hands-on where applicable, showing step-by-step how to complete each lab exercise. Participants can follow along and ask questions as they work through each exercise.

The expected outcome from a hands-on labs course for the OWASP Top 10 is that participants will develop a deep understanding of web application security risks and best practices, as well as practical skills for identifying and mitigating vulnerabilities in web applications.

Course Details

  • Language

    Course is delivered in Arabic language with English presentations

  • Course Level

    Intermediate level - Fair knowledge of IT concepts

  • Duration

    24 hours. Delivered over 8 consecutive days where each session is 3 hours.

  • Course Nature

    The course is Live. Participants can direct questions to the instructor.

  • Course Availability

    The course is Live. It will not be available post completion.

  • Certificate of Completion

    Shareable certificate of completion

What others have said about this course

Requirements and Prerequisites

  • Internet Speed

    Since the course is Live, a reasonable Internet speed is required to allow for continuous participation.

  • Laptop

    Participants are expected to have laptops as they will have hands-on practice of certain topics.

  • IT Concepts

    1. Basic knowledge of web development and familiarity with basic security concepts. 2. Preferable to have completed the App Sec course provided by IKG Learning.