Skip to content
Crown_

Build Your Team of Diligent Developers

Download Your Program Materials

Your program materials are here: The Diligent Developer Chronicles: OWASP Top 10 PDF, Program Guide, and Digital Assets.

OWASP Top 10 | Part 1

Video Lesson

Define the risks of broken access control, cryptographic failures, and injection attacks and their mitigations.

OWASP Top 10 | Part 2

Video Lesson

Define the risks of insecure design, security misconfigurations, vulnerable and outdated components, identification and authentication failures, and how to mitigate them.

OWASP Top 10 | Part 3

Video Lesson

Define the risks of software and data integrity failures, security logging and monitoring failures, server-side request forgery, and their mitigations.

Server-Side Request Forgery

Break/Fix Lesson

Learn the different kinds of Server-Side Request Forgery attacks and mitigations.

 

Injection: SQL and Command

Break/Fix Lesson

SQL and command injection attacks insert structured commands directly inside an application, with real-life examples.

Security Logging and Monitoring

Break/Fix Lesson

SQL and command injection attacks insert structured commands directly inside an application, with real-life examples.