Packt

OWASP Top 10

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

13 hours to complete
3 weeks at 4 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

13 hours to complete
3 weeks at 4 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Understand the critical vulnerabilities identified in the OWASP Top 10 list

  • Learn how to exploit common web application security flaws and understand their consequences

  • Master techniques to fix vulnerabilities and improve the overall security of your applications

  • Develop a framework for verifying the effectiveness of your security fixes in real-world applications

Skills you'll gain

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

July 2025

Assessments

11 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 11 modules in this course

In this module, we will introduce you to the OWASP Top 10 Web Application Vulnerabilities, focusing on their importance in web security. You'll gain a broad understanding of the most critical risks, their impact on applications, and practical steps to prevent them.

What's included

1 video1 reading

In this module, we will explore the concept of Broken Access Control, demonstrate how attackers exploit this vulnerability, and guide you through the process of fixing and verifying access control in your applications.

What's included

3 videos1 assignment1 plugin

In this module, we will focus on Cryptographic Failures, showing how insecure cryptographic methods can compromise application security. We'll walk you through remediation strategies and verification to ensure your application is protected.

What's included

3 videos1 assignment1 plugin

In this module, we will dive into Injection vulnerabilities, demonstrating how attackers exploit unsanitized user inputs and how to prevent these attacks through proper input handling and validation.

What's included

3 videos1 assignment1 plugin

In this module, we will explore Insecure Design vulnerabilities, examining design flaws that leave applications exposed. You'll learn how to apply secure design principles and verify that changes effectively enhance security.

What's included

3 videos1 assignment1 plugin

In this module, we will cover Security Misconfiguration, demonstrating how incorrect configurations can open the door to exploits. We will walk through the process of identifying, fixing, and verifying secure application configurations.

What's included

3 videos1 assignment1 plugin

In this module, we will focus on managing vulnerable and outdated components, exploring how outdated dependencies can compromise security. You'll learn how to update and maintain components to reduce risk in your applications.

What's included

3 videos1 assignment1 plugin

In this module, we will examine Identification and Authentication Failures, identifying flaws in user access control and how to secure authentication mechanisms. We'll demonstrate solutions and verify their effectiveness.

What's included

3 videos1 assignment1 plugin

In this module, we will explore Software and Data Integrity Failures, focusing on how assumptions about data validity can lead to security breaches. We will show how to fix integrity failures and discuss design considerations to prevent such issues.

What's included

3 videos1 assignment1 plugin

In this module, we will focus on Security Logging and Monitoring Failures, emphasizing the importance of proper logging and monitoring in detecting security breaches. We'll guide you through the implementation and verification of effective logging practices.

What's included

3 videos1 assignment1 plugin

In this module, we will explore the concept of server-side request forgery (SSRF) vulnerabilities in web applications. You will learn how attackers can exploit these weaknesses to access unauthorized resources. We will also guide you through securing your application by applying fixes and verifying their effectiveness to prevent SSRF threats.

What's included

3 videos2 assignments

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.

Instructor

Packt - Course Instructors
Packt
756 Courses157,214 learners

Offered by

Packt

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions