Back to OWASP Top 10 - Welcome and Risks 1-5
Infosec

OWASP Top 10 - Welcome and Risks 1-5

In this course, we will look at the OWASP organization and what its purpose is. We’ll dive into the details of how they create the Top Ten list: where it comes from, how they calculate the severity of each risk and how they determine where each risk ranks. We also review the possible disparity between OWASP’s ranking and your own organization’s ranking, depending on your needs. We will also examine Broken Access Control, Cryptographic Failures, Injection Attacks, Insecure Design and Security Misconfiguration. We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.

Status: Vulnerability Assessments
Status: System Configuration
IntermediateCourse4 hours

Featured reviews

MY

5.0Reviewed Dec 22, 2022

it was really good in case of information , teacher and time of the course thanks a lot lovely coursera .

EP

4.0Reviewed Dec 16, 2022

Great content and does a good job of explaining OWASP, but I found the pace to be a little slow.

BV

5.0Reviewed Aug 18, 2022

Good straight forward explanations and easily understandable.

DA

5.0Reviewed Jan 23, 2025

Easily understandable, thorough overview of the OWASP risks. Suitable for not deeply technical audience.

All reviews

Showing: 10 of 10

Deleted Account
2.0
Reviewed Feb 26, 2025
Mohamad Yamini
5.0
Reviewed Dec 23, 2022
Dev Acc
5.0
Reviewed Jan 24, 2025
Bojan Vasic
5.0
Reviewed Aug 19, 2022
Ian Mann
5.0
Reviewed Jan 15, 2025
Claudio Starke
5.0
Reviewed Jul 8, 2024
Syed Mujtaba
5.0
Reviewed Feb 17, 2025
Anchal Gupta
5.0
Reviewed Oct 13, 2022
Elroy Parkinson
4.0
Reviewed Dec 17, 2022
Rohit Rishishwar
4.0
Reviewed Jul 5, 2023