Earn a shareable certificate to add to your LinkedIn profile.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
Introduce the Top Ten Cloud Risks and their relationship to published OWASP Top Ten risk lists. Examine the highest-priority risk: injection attacks.
This module reviews risks arising from authentication failures, sensitive data exposure, and availability risks (e.g. flooding).
This module reviews risks arising from access control failures, security misconfiguration, and cross-site scripting.
This module reviews risks arising from insecure deserialization, flawed software components, and inadequate logging or monitoring.