Enrolment options

Linked learning / IT / Security

OWASP Top 10: #1 Injection and #2 Broken Authentication

Get an overview of the top two software vulnerabilities—injection and broken authentication attacks—described in the OWASP Top 10.
Guests cannot access this course. Please log in.