Enrolment options
Linked learning / IT / Security
OWASP Top 10: #1 Injection and #2 Broken Authentication
Get an overview of the top two software vulnerabilities—injection and broken authentication attacks—described in the OWASP Top 10.
Guests cannot access this course. Please log in.