Learn OWASP!

28 OWASP courses are available from Pluralsight, Coursera, Udemy and Packt.

The Open Web Application Security Project (OWASP) is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. == History == Mark Curphey started OWASP on September 9, 2001. Jeff Williams served as the volunteer Chair of OWASP from late 2003 until September 2011. As of 2015, Matt Konda chaired the Board.The OWASP Foundation, a 501(c)(3) non-profit organization (in the USA) established in 2004, supports the OWASP infrastructure and projects. Since 2011, OWASP is also registered as a non-profit organization in Belgium under the name of OWASP Europe VZW. == Publications and resources == OWASP Top Ten: The "Top Ten", first published in 2003, is regularly updated. - read more on Wikipedia

  • flag Pluralsight
  • student Beginner
  • database video
  • earth English
  • clock 1h 12m

Play by Play: OWASP Top 10 2017

The OWASP Top 10 2017. Understand the ten most critical web application security risks^ the inclusion of new risks^ and the demotion of previous risks.

Read More
  • flag Pluralsight
  • student Intermediate
  • database video
  • earth English
  • clock 2h 3m

Web Security and the OWASP Top 10: The Big Picture

OWASP Top 10 The Big Picture is all about understanding the top 10 web security risks we face on the web today in an easily consumable^ well-structured fashion that aligns to the number one industry standard on the topic today.

Read More
  • flag Coursera
  • student Intermediate
  • database eLearning
  • earth English
  • clock 15h

Web Application Security Testing with OWASP ZAP

By the end of this project^ you will learn the fundamentals of how to use OWASP Zed Attack Proxy (ZAP). This tool greatly aids security professionals and penetration testers to discover vulnerabilities within web applications. You will learn how to …

Read More
  • flag Udemy
  • student All Levels
  • database eLearning
  • earth English
  • clock 1h

Learning Web Security OWASP Top 10 2019

New Web Security 2019

Read More
  • flag Packt
  • student All Levels
  • database book
  • earth nan
  • clock 10h 8m

nan

Master the art of exploiting advanced web penetration techniques with Kali Linux 2016.2

Read More
  • flag Pluralsight
  • student Intermediate
  • database Video
  • earth English
  • clock 1h 23m

Secure Coding: Preventing Sensitive Data Exposure

In this course^ you will look from an attack-driven perspective at several OWASP recommendations for preventing sensitive data exposure when developing a web application.

Read More
  • flag Pluralsight
  • student Intermediate
  • database Video
  • earth English
  • clock 2h 10m

Web Application Penetration Testing: Configuration and Deployment Management Testing

This course will teach you how to perform systematic penetration testing of configuration and deployment management using OWASP principles.

Read More
  • flag Pluralsight
  • student Intermediate
  • database Video
  • earth English
  • clock 22m

Cross Site Request Forgery (CSRF) Prevention for ASP.NET Core and ASP.NET Applications

Cross Site Request Forgery (CSRF) is high on the OWASP top 10 list of the most used attacks. Learn how to protect your ASP.NET and ASP.NET Core applications against it.

Read More
  • flag Pluralsight
  • student Intermediate
  • database Video
  • earth English
  • clock 25m

Cross Site Scripting (XSS) Prevention for ASP.NET Core and ASP.NET Applications

Cross Site Scripting (XSS) is high on the OWASP top 10 list of the most used attacks. Learn how to protect your ASP.NET and ASP.NET Core applications against it.

Read More
  • flag Udemy
  • student Beginner
  • database eLearning
  • earth English
  • clock 7h

Cybersecurity: Attack & Defense Strategies (Red & Blue Team)

Enhance your organization’s security posture by improving your attack and defense strategies

Read More
  • flag Coursera
  • student Intermediate
  • database eLearning
  • earth English
  • clock 24h

Exploiting and Securing Vulnerabilities in Java Applications

In this course^ we will wear many hats. With our Attacker Hats on^ we will exploit Injection issues that allow us to steal data^ exploit Cross Site Scripting issues to compromise a users browser^ break authentication to gain access to …

Read More
  • flag Packt
  • student All Levels
  • database video
  • earth nan
  • clock 3h 41m

nan

Learn OWASP TOP 10 Vulnerability Categories and the Defenses and Fixes for them. Covering all the popular hacking types

Read More