12 Steps
- Lektion 1 – OWASP Top 10 Grundlagen
- Lektion 2 – Vulnerable Web Applications
- Lektion 3 – A01 – Broken Access Control
- Lektion 4 – A02 – Cryptographic Failures
- Lektion 5 – A03 – Injection
- Lektion 6 – A04 – Insecure Design
- Lektion 7 – A05 – Security Misconfiguration
- Lektion 8 – A06 – Vulnerable and Outdated Components
- Lektion 9 – A07 – Identification and Authentication Failures
- Lektion 10 – A08 – Software and Data Integrity Failures
- Lektion 11 – A09 – Security Logging and Monitoring Failures
- Lektion 12 – A10 – Server-Side Request Forgery