12 Steps

  • Lektion 1 – OWASP Top 10 Grundlagen
  • Lektion 2 – Vulnerable Web Applications
  • Lektion 3 – A01 – Broken Access Control
  • Lektion 4 – A02 – Cryptographic Failures
  • Lektion 5 – A03 – Injection
  • Lektion 6 – A04 – Insecure Design
  • Lektion 7 – A05 – Security Misconfiguration
  • Lektion 8 – A06 – Vulnerable and Outdated Components
  • Lektion 9 – A07 – Identification and Authentication Failures
  • Lektion 10 – A08 – Software and Data Integrity Failures
  • Lektion 11 – A09 – Security Logging and Monitoring Failures
  • Lektion 12 – A10 – Server-Side Request Forgery