Catalogue
/
Security
/
OWASP Top 10 and Common Vulnerabilities

OWASP Top 10 and Common Vulnerabilities

An advanced practical course for experienced developers on preventing the most critical web risks. Participants connect the OWASP Top 10 to day to day design and coding choices and learn fast ways to detect and fix issues.

What will you learn?

You will map the OWASP Top 10 to your stack, spot risky patterns in code and configuration, and apply simple but effective fixes that survive refactors and scale. After this training you will be confident in:

  • Explaining the Top 10 risks in clear technical terms
  • Choosing safe defaults for auth, data handling, and dependency use
  • Writing tests and checks that catch common issues early
  • Prioritizing remediation by exploitability and impact

Requirements:

  • Strong proficiency in at least one web stack
  • Working knowledge of HTTP, APIs, and databases
  • Access to non sensitive example code is helpful

Course Outline*:

*We know each team has their own needs and specifications. That is why we can modify the training outline per need.

Module 1: Threat landscape and secure design first

  • Risk based view of the OWASP Top 10 and how attacks chain
  • Trust boundaries, inputs, and data flow as design anchors
  • Secure defaults for configuration, headers, and error handling

Module 2: Access control and authentication pitfalls

  • Broken access control patterns and simple allow list thinking
  • Session and token handling and protecting cookies and storage
  • Multi tenant hints and enforcing object level checks

Module 3: Data protection and injection defenses

  • Cryptographic failures in practice secrets, keys, and TLS
  • Injection families and safe patterns for queries and commands
  • Output encoding and context awareness in templates and APIs

Module 4: Insecure design and API basics

  • From feature to misuse case and abuse resistance
  • Rate limits, quotas, and resource ceilings
  • API specific risks versioning, mass assignment, and batching

Module 5: Security misconfiguration and vulnerability exposure

  • Fragile defaults, verbose errors, and missing headers
  • Cloud and container gotchas images, secrets, and metadata
  • Sensitive data exposure through logs and backups

Module 6: SSRF, deserialization, and dependency risk

  • Server side request forgery patterns and network egress control
  • Unsafe deserialization and safer serializers and formats
  • Supply chain issues dependency hygiene and update strategy

Module 7: Integrity, monitoring, and CI or CD guardrails

  • Integrity failures package signing, checksums, and pinning
  • Logging that helps detect and investigate incidents
  • Build and deploy checks secrets scanning and parameterized configs

Module 8: Verification and remediation workflow

  • Light test strategy unit, integration, and security checks
  • Triage by exploitability and blast radius
  • Remediation playbook owners, timelines, and backporting fixes

Hands-on learning with expert instructors at your location for organizations.

4.122€*
Graph Icon - Education X Webflow Template
Level:
advanced
Clock Icon - Education X Webflow Template
Duration:
14
Hours (days:
2
)
Camera Icon - Education X Webflow Template
Training customized to your needs
Star Icon - Education X Webflow Template
Immersive hands-on experience in a dedicated setting
*Price can range depending on number of participants, change of outline, location etc.

Master new skills guided by experienced instructors from anywhere.

3.087€*
Graph Icon - Education X Webflow Template
Level:
advanced
Clock Icon - Education X Webflow Template
Duration:
14
Hours (days:
2
)
Camera Icon - Education X Webflow Template
Training customized to your needs
Star Icon - Education X Webflow Template
Reduced training costs
*Price can range depending on number of participants, change of outline, location etc.