Back to OWASP Top 10 - Risks 6-10
Infosec

OWASP Top 10 - Risks 6-10

In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.

Status: Data Integrity
Status: Event Monitoring
IntermediateCourse3 hours

Featured reviews

PF

5.0Reviewed Oct 5, 2022

V​ery useful, liked the tone of instructor and the resources, invaluable.

MY

5.0Reviewed Dec 17, 2022

The teacher is so fluent in case of security and also teaches perfect

DA

5.0Reviewed Jan 23, 2025

Easily understandable, thorough overview of the OWASP risks. Suitable for not deeply technical audience.

All reviews

Showing: 7 of 7

Dev Acc
5.0
Reviewed Jan 24, 2025
Pablo Falco
5.0
Reviewed Oct 6, 2022
Mohamad Yamini
5.0
Reviewed Dec 18, 2022
Uriel Navarrete
5.0
Reviewed Jul 1, 2025
Aaron Soto
5.0
Reviewed Feb 20, 2023
Syed Mujtaba
5.0
Reviewed Feb 26, 2025
Deleted Account
2.0
Reviewed Feb 26, 2025