- Level Professional
- Duration 3 hours
- Course by Infosec
-
Offered by
About
In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.Modules
Vulnerable and Outdated Components
1
Videos
- Vulnerable and Outdated Components
Identification and Authentication Failures
1
Videos
- Identification and Authentication Failures
Software and Data Integrity Failures
1
Videos
- Software and Data Integrity Failures
Security Logging and Monitoring Failures
1
Videos
- Security Logging and Monitoring Failures
Server-Side Request Forgery (SSRF)
1
Assignment
- OWASP Top 10 - Risks 6-10
1
Videos
- Server-Side Request Forgery (SSRF)
Auto Summary
Explore the OWASP Top 10 risks 6-10 in IT & Computer Science with Coursera. Led by expert instructors, this professional-level course delves into Vulnerable and Outdated Components, Authentication Failures, Data Integrity Failures, Security Logging and Monitoring Failures, and SSRF. Engage with demos, graphics, and real-life examples over 180 minutes. Available via Starter and Professional subscriptions. Ideal for IT professionals seeking advanced security knowledge.
Instructor
John Wagnon