OWASP Top Ten: Risks 6-10 Course

Discuss the details of the last five security risks in the OWASP Top Ten.

2 hours, 36 minutes

Course description

In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks.

Syllabus

Server-Side Request Forgery

Video - 00:24:00

In this video, we explore the concept of Server-Side Request Forgery (SSRF) and give examples of how it can be used and abused by attackers.
Security Logging and Monitoring Failures

Video - 00:33:00

A look at examples of logging and monitoring tools and how administrators need to have a good way of viewing logs and taking action on the logging and monitoring data.
Software and Data Integrity Failures

Video - 00:28:00

This risk centers around making assumptions related to software updates, critical data and CI/CD pipelines without verifying integrity.
Identification and Authentication Failures

Video - 00:34:00

Explore common identification and authentication mechanisms and how they are exploited.
Vulnerable and Outdated Components

Video - 00:38:00

Explore common components of modern web applications and talk about how they can commonly present security risks that administrators and managers need to understand.

Meet the author

John Wagnon

John Wagnon is an Enterprise Systems Engineer with Fortinet where he provides technical security solutions for some of the largest companies in the world. John is certified in several industry-relevant areas including Fortinet NSE 7 (Security Architect), CISSP, Certified Ethical Hacker and Six Sigma (Process Improvement).
Prior to his work at Fortinet, John was a Solutions Architect with F5 where he provided technical solutions for F5 customers around the world.  Prior to F5, he worked for a technology consulting firm where he analyzed cyberattacks against U.S. Department of Defense computer systems and networks.  Prior to his consulting work, he was a Communications Officer in the U.S. Air Force where he specialized in ground and satellite networks.  John holds a Bachelor of Science in Computer Engineering and a Master of Science in Computer Networks.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Systems Security Analyst
  • Data Analyst
  • Cyber Defense Analyst

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo

Award-winning training you can trust