Online Course – Certified Professional Internship in OWASP Top 10 – 2021 by Infosec Institute

Looking for help deciding on your next purchase? Discover helpful tips, guides, and information to help you choose the perfect product in every category.

Suggested by: Coursera (What is Coursera?)

Professional Certificate

Intermediate level

No prior knowledge required

Time to complete the course

7-day free trial

No unnecessary risks

Skills you will acquire in the course

  • Understanding basic concepts in computer science
  • Java software development
  • Working with databases
  • Object-oriented programming
  • User interface design
  • Mastery of HTML and CSS
  • Programming in Python
  • Working with APIs
  • Software testing techniques
  • Problem solving and logical thinking

What you will learn in the course

Courses for which the course is suitable

  • Information Security Specialist
  • Information Security Analyst
  • Information Security Engineer
  • Secure software developer
  • Software Security Tester
  • Information Security Consultant
  • Information Security Manager
  • Cybersecurity researcher
  • Risk Management Specialist
  • Access Control Specialist

Internship – a three-part course series

introduction

In this level of learning, we will examine the OWASP organization and its goals. We will then explore issues such as:

  • Poor access control
  • Failures in cryptography
  • Injection attacks
  • Unsafe planning
  • Poor security configuration

Demos, graphics, and real-life examples are used to help you understand the details of each of these risks.

Additional Risk Review

Below we will examine:

  • Vulnerable and outdated components
  • Failures in identification and verification
  • Software and data integrity failures
  • Security logging and monitoring failures
  • Server-side request forgery (SSRF) attacks

After we complete our review of the OWASP Top Ten Risks, we will look at three highly relevant security risks that were studied for broader topics in the OWASP Top Ten Risks 2021 list. It is still important to know the details of how these risks work.

Specific risks
  • External Entities in XML (XXE)
  • Cross-site script injection (XSS)
  • Unsafe deserialization

Hands-on Learning Project

There are no projects in this specialization. Students will have the opportunity to validate the knowledge they have acquired during each of the courses with:

  • Practices
  • Graded assessments at the end of each module and at the end of each course

Graded exercises and assessments are used to verify and demonstrate learning outcomes.

Details of the courses that make up the specialization

OWASP Top 10 – Introduction and Risks 1-5

  • Course 1 • 4 hours • 4.5 (63 ratings)

Course Details

What you’ll learn
  • We will examine the OWASP organization and its purpose.
  • Let’s dive into the details of how to create the top ten risks list:
    • Where does she come from?
    • How to calculate risk severity
    • How is the risk rating determined?
  • We will discuss the potential gap between OWASP’s rating and your organization’s rating based on your needs.
  • We will also examine the issue of poor access control, coding failures, injection attacks, insecure design, and incorrect security configuration.
  • Demos, graphics, and real-life examples are used to help you understand the details of each of these risks.

OWASP Top 10 – Risks 6-10

  • Course 2 • 3 hours • 4.6 (53 ratings)

Course Details

What you’ll learn
  • We will examine weak and outdated components.
  • Identification and verification failures.
  • Software and data reliability failures.
  • Security registration and activation failures.
  • SSRF (Server-Side Request Forgery) attacks.
  • Demos, graphics, and real-life examples are used to help understand the details of these risks.

Previous OWASP Risks

  • Course 3 • 2 hours • 4.8 (17 ratings)

Course Details

What you’ll learn
  • We will examine three highly relevant security risks, which have merged into larger themes in the OWASP Top Ten list for 2021.
  • It is still important to know the details of how these risks work.
  • We will explore external entities in XML (XXE).
  • XSS (Cross-Site Scripting) attacks.
  • Derealization is not safe.