Learn about the top ten software vulnerabilities, as described by the Open Web Application Security Project (OWASP).
- [Caroline] My name is is Caroline Wong, and I've been working in the information security field since 2005. For the past several years I've been focused on the area of application security. It seems like every day you hear about a new security incident or breech in the news. Have you ever wondered what it is about software that makes it so vulnerable? It turns out there's a top 10 list that describes some of the most common security vulnerabilities that hackers often take advantage of in order to conduct their attacks.
In this course I'll be talking through the OWASP top 10 items at a high level so that you can understand the basic concepts behind each vulnerability and the types of attacks that can occur when they exist. If you're ready to go, let's get started.