In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.



OWASP Top 10 - Risks 6-10
This course is part of OWASP Top 10 - 2021 Specialization

Instructor: John Wagnon
Access provided by Mindsprint
2,987 already enrolled
(62 reviews)
Skills you'll gain
Details to know

Add to your LinkedIn profile
1 assignment
See how employees at top companies are mastering in-demand skills

Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate

There are 5 modules in this course
What's included
1 video
What's included
1 video
What's included
1 video
What's included
1 video
What's included
1 video1 assignment
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor

Offered by
Why people choose Coursera for their career




Learner reviews
62 reviews
- 5 stars
69.35%
- 4 stars
25.80%
- 3 stars
3.22%
- 2 stars
1.61%
- 1 star
0%
Showing 3 of 62
Reviewed on Dec 17, 2022
The teacher is so fluent in case of security and also teaches perfect
Reviewed on Jan 23, 2025
Easily understandable, thorough overview of the OWASP risks. Suitable for not deeply technical audience.
Reviewed on Oct 5, 2022
Very useful, liked the tone of instructor and the resources, invaluable.
Explore more from Computer Science

Infosec

University of California, Davis

Infosec


