You should have experience with developing web applications using C# or other object oriented programming languages.
As technology advances, knowing how to protect yourself from hackers is becoming increasingly important. This path will help you to explore strategies to ensure you’re always one step ahead of the hackers by diving deep into the top OWASP threats. Understand the importance of protecting data, exactly what data needs to be protected, and learn the best strategies for protecting it. Discover how vulnerable you are if your frameworks, servers, and applications aren’t configured correctly, are left in out-of-the-box configurations, or are not kept up-to-date. Adopt the mindset of a hacker to ensure the applications you’re building are secure and learn what a developer can do to avoid a major exploit. See examples of Cross-Site Forgery, how a phishing email works, vulnerabilities of open source components, and redirects from invalidated links. Learn about Sensitive Data Exposure and pick up some techniques for how to store data securely.
It is common for users to take all the courses in this path in the order shown below.
10+ hours covering 39 topics
|OWASP: Security Basics /**/||/**/||/**/|
|OWASP, Part 1 of 4: Avoiding Hacker Tricks /**/||6 /**/||1h 24m||Intermediate /**/|
|OWASP, Part 2 of 4: Forgery and Phishing /**/||3 /**/||0h 40m||Intermediate /**/|
|OWASP: Threats Fundamentals /**/||/**/||/**/|
|OWASP, Part 3 of 4: Threats and Session Security /**/||4 /**/||1h 38m||Intermediate /**/|
|OWASP, Part 4 of 4: Misconfiguration and Data Encryption /**/||5 /**/||2h 6m||Intermediate /**/|
|OWASP Proactive Controls /**/||/**/||/**/|
|OWASP Proactive Controls, Part 1 of 2: Controls 1 through 5 /**/||6 /**/||1h 56m||Intermediate /**/|
|OWASP Proactive Controls, Part 2 of 2: Controls 6 through 10 /**/||4 /**/||0h 55m||Intermediate /**/|
|OWASP Top 10 2017 Update /**/||11 /**/||1h 25m||Intermediate /**/|