Skip to main content
Guest user
My info
My courses
My calendar
My grades
My certifications
My preferences
Home
Course catalog
User Guide
English (en)
English (en)
فارسی (fa)
Login
OWASP Top 10: #1 Injection and #2 Broken Authentication
Home
Courses
OWASP Top 10: #1 Injection and #2 Broken Authentication
Start or Resume Course
OWASP Top 10: #1 Injection and #2 Broken Authentication
Get an overview of the top two software vulnerabilities—injection and broken authentication attacks—described in the OWASP Top 10.
Content
6962