OWASP SuccessPath

Prerequisites
You should have experience with developing web applications using C# or other object oriented programming languages. 

Description
As technology advances, knowing how to protect yourself from hackers is becoming increasingly important. This path will help you to explore strategies to ensure you’re always one step ahead of the hackers by diving deep into the top OWASP threats. Understand the importance of protecting data, exactly what data needs to be protected, and learn the best strategies for protecting it. Discover how vulnerable you are if your frameworks, servers, and applications aren’t configured correctly, are left in out-of-the-box configurations, or are not kept up-to-date. Adopt the mindset of a hacker to ensure the applications you’re building are secure and learn what a developer can do to avoid a major exploit. See examples of Cross-Site Forgery, how a phishing email works, vulnerabilities of open source components, and redirects from invalidated links. Learn about Sensitive Data Exposure and pick up some techniques for how to store data securely.

Course Path
It is common for users to take all the courses in this path in the order shown below.  

OWASP

10+ hours covering 39 topics

Course TitleTopicsRuntimeSkill LevelTrailer
OWASP: Security Basics /**/ /**/ /**/
OWASP, Part 1 of 4: Avoiding Hacker Tricks /**/ 6 /**/ 1h 24m Intermediate /**/
OWASP, Part 2 of 4: Forgery and Phishing /**/ 3 /**/ 0h 40m Intermediate /**/
OWASP: Threats Fundamentals /**/ /**/ /**/
OWASP, Part 3 of 4: Threats and Session Security /**/ 4 /**/ 1h 38m Intermediate /**/
OWASP, Part 4 of 4: Misconfiguration and Data Encryption /**/ 5 /**/ 2h 6m Intermediate /**/
OWASP Proactive Controls /**/ /**/ /**/
OWASP Proactive Controls, Part 1 of 2: Controls 1 through 5 /**/ 6 /**/ 1h 56m Intermediate /**/
OWASP Proactive Controls, Part 2 of 2: Controls 6 through 10 /**/ 4 /**/ 0h 55m Intermediate /**/
OWASP Top 10 2017 Update /**/ 11 /**/ 1h 25m Intermediate /**/