OWASP Top Ten: Risks One through Five

Explore the details of security risks one through five in the OWASP Top Ten list.

6 videos  //  216 minutes of training

Free training week — 1,400+ on-demand courses and hands-on labs

Course description

In this course, we will examine Injection Attacks, Broken Authentication, Sensitive Data Exposure, XML External Entities (XXE) and Broken Access Control. We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks. You’ll learn a lot and have a great time doing it!

Course syllabus

Risk One - InjectionDuration: 35:07

Injection DemoDuration: 4:24

Risk Two - Broken AuthenticationDuration: 50:16

Risk Three - Sensitive Data ExposureDuration: 50:34

Risk Four - XXEDuration: 40:53

Risk Five - Broken Access ControlDuration: 35:02

Meet the author

John Wagnon

LinkedIn

John Wagnon is a Senior Solution Developer for F5 Network’s DevCentral technical community where he utilizes the full spectrum of F5 technology to analyze and solve complex problems for F5 users all over the world. John is certified in several industry-relevant areas including CISSP, Certified Ethical Hacker and Six Sigma (Process Improvement).

Prior to his work at F5, John was a Communications Officer in the U.S. Air Force where he specialized in ground and satellite networks. After leaving the Air Force, he worked for a technology consulting firm where he analyzed cyber-attacks against U.S. Department of Defense computer systems and networks. John holds a Bachelor of Science in Computer Engineering and a Master of Science in Computer Networks.

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec