OWASP Top 10

Learn how to practically use the world-wide consensus about the most critical security risks to web applications.

Journey contents

  • Injection
  • Broken Authentication
  • Sensitive Data Exposure
  • XML External Entities
  • Broken Access Control
  • Security Misconfiguration
  • Cross-site scripting
  • Insecure Deserialization
  • Using Components with Known vulnerabilities
  • Insufficient Logging & Monitoring
  • Consolidation Exam