Get a free account
OWASP Top Ten Overview
Training Modules
Related content
Insecure Deserialization
This module covers best practices for serialization - the process of turning data objects into binary streams of data.
Cross-Site Request Forgery (CSRF)
In this module, we’ll review common exploitation techniques and ways learners can protect applications from cross-site request forgery.
Under-protected APIs
This module defines underprotected APIs, explains why API security is important and discusses common attack methods and mitigation strategies.