OWASP SuccessPath

You should have experience with developing web applications using C# or other object oriented programming languages. 

As technology advances, knowing how to protect yourself from hackers is becoming increasingly important. This path will help you to explore strategies to ensure you’re always one step ahead of the hackers by diving deep into the top OWASP threats. Understand the importance of protecting data, exactly what data needs to be protected, and learn the best strategies for protecting it. Discover how vulnerable you are if your frameworks, servers, and applications aren’t configured correctly, are left in out-of-the-box configurations, or are not kept up-to-date. Adopt the mindset of a hacker to ensure the applications you’re building are secure and learn what a developer can do to avoid a major exploit. See examples of Cross-Site Forgery, how a phishing email works, vulnerabilities of open source components, and redirects from invalidated links. Learn about Sensitive Data Exposure and pick up some techniques for how to store data securely.

Course Path
It is common for users to take all the courses in this path in the order shown below.  


8+ hours covering 28 topics

Course TitleTopicsRuntimeSkill LevelTrailer
OWASP: Security Basics
OWASP, Part 1: Avoiding Hacker Tricks 6 1h 24m Intermediate
OWASP, Part 2: Forgery and Phishing 3 0h 40m Intermediate
OWASP: Threats Fundamentals
OWASP, Part 3: Threats and Session Security 4 1h 38m Intermediate
OWASP, Part 4: Misconfiguration and Data Encryption 5 2h 6m Intermediate
OWASP Proactive Controls
OWASP Proactive Controls, Part 1: Controls 1 through 5 6 1h 56m Intermediate
OWASP Proactive Controls, Part 2: Controls 6 through 10 4 0h 55m Intermediate