
Build Your Team of Diligent Developers
Download Your Program Materials
Your program materials are here: The Diligent Developer Chronicles: OWASP Top 10 PDF, Program Guide, and Digital Assets.
OWASP Top 10 | Part 1
Video Lesson
Define the risks of broken access control, cryptographic failures, and injection attacks and their mitigations.
OWASP Top 10 | Part 2
Video Lesson
Define the risks of insecure design, security misconfigurations, vulnerable and outdated components, identification and authentication failures, and how to mitigate them.
OWASP Top 10 | Part 3
Video Lesson
Define the risks of software and data integrity failures, security logging and monitoring failures, server-side request forgery, and their mitigations.
Server-Side Request Forgery
Break/Fix Lesson
Learn the different kinds of Server-Side Request Forgery attacks and mitigations.
Injection: SQL and Command
Break/Fix Lesson
SQL and command injection attacks insert structured commands directly inside an application, with real-life examples.
Security Logging and Monitoring
Break/Fix Lesson
SQL and command injection attacks insert structured commands directly inside an application, with real-life examples.