In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.
OWASP Top 10 - Risks 6-10
This course is part of OWASP Top 10 - 2021 Specialization
Instructor: John Wagnon
Sponsored by Louisiana Workforce Commission
2,440 already enrolled
(53 reviews)
Details to know
Add to your LinkedIn profile
1 assignment
See how employees at top companies are mastering in-demand skills
Build your subject-matter expertise
- Learn new concepts from industry experts
- Gain a foundational understanding of a subject or tool
- Develop job-relevant skills with hands-on projects
- Earn a shareable career certificate
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
There are 5 modules in this course
What's included
1 video
What's included
1 video
What's included
1 video
What's included
1 video
What's included
1 video1 assignment
Instructor
Offered by
Why people choose Coursera for their career
Learner reviews
53 reviews
- 5 stars
67.92%
- 4 stars
28.30%
- 3 stars
3.77%
- 2 stars
0%
- 1 star
0%
Showing 3 of 53
Reviewed on Oct 5, 2022
Very useful, liked the tone of instructor and the resources, invaluable.
Reviewed on Dec 17, 2022
The teacher is so fluent in case of security and also teaches perfect
Recommended if you're interested in Computer Science
University of Colorado System
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy