返回到 OWASP Top 10 - Welcome and Risks 1-5
Infosec

OWASP Top 10 - Welcome and Risks 1-5

In this course, we will look at the OWASP organization and what its purpose is. We’ll dive into the details of how they create the Top Ten list: where it comes from, how they calculate the severity of each risk and how they determine where each risk ranks. We also review the possible disparity between OWASP’s ranking and your own organization’s ranking, depending on your needs. We will also examine Broken Access Control, Cryptographic Failures, Injection Attacks, Insecure Design and Security Misconfiguration. We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.

状态:Vulnerability Assessments
状态:Encryption
中级课程小时

精选评论

EP

4.0评论日期:Dec 16, 2022

Great content and does a good job of explaining OWASP, but I found the pace to be a little slow.

BV

5.0评论日期:Aug 18, 2022

Good straight forward explanations and easily understandable.

DA

5.0评论日期:Jan 23, 2025

Easily understandable, thorough overview of the OWASP risks. Suitable for not deeply technical audience.

MY

5.0评论日期:Dec 22, 2022

it was really good in case of information , teacher and time of the course thanks a lot lovely coursera .

所有审阅

显示:10/10

Deleted Account
2.0
评论日期:Feb 26, 2025
Mohamad Yamini
5.0
评论日期:Dec 23, 2022
Dev Acc
5.0
评论日期:Jan 23, 2025
Bojan Vasic
5.0
评论日期:Aug 19, 2022
Ian Mann
5.0
评论日期:Jan 15, 2025
Claudio Starke
5.0
评论日期:Jul 8, 2024
Syed Mujtaba
5.0
评论日期:Feb 17, 2025
Anchal Gupta
5.0
评论日期:Oct 13, 2022
Elroy Parkinson
4.0
评论日期:Dec 17, 2022
Rohit Rishishwar
4.0
评论日期:Jul 5, 2023