Skill Level Intermediate
- Many of the data breaches that you hear about in the news are the result of a failure to follow a robust security procedure. Some of these issues have nothing to do with technical code problems, but are the result of a broken or non-existent process. The Open Web Application Security Project provides a list that describes some of the most common security vulnerabilities. It's called the OWASP Top 10 and it can help you to address vulnerabilities in your organization's software. In this course, I'm going to talk about vulnerability categories numbers nine and 10 using components with known vulnerabilities and insufficient logging and monitoring. These two OWASP items require people and process to work together to solve security issues. Throughout this course, I'll describe how these common vulnerabilities work. We'll examine some real life examples and their impact to companies and consumers. I'll also provide you with prevention techniques so that you know how to address these types of issues in your software. Hi, I'm Caroline Wong, and I'm the Chief Security Strategies at Cobalt.io. Come and join me in my LinkedIn Learning course on the OWASP Top 10 numbers nine and 10.