Play by Play is a series in which top technologists work through a problem in real time, unrehearsed, and unscripted. In this course, Play by Play: OWASP Top 10 2017, Troy Hunt and Andrew van der Stock discuss the methodology used to construct the 2017 version of the OWASP Top 10. YouÕll learn how the analysis of the data collected resulted in a reordering of the risks from the 2013 version, the inclusion of new risks, and the demotion of some risks that were included in previous versions. By the end of this course, youÕll be familiar with each risk and understand how best to use the 2017 OWASP Top 10.
The OWASP Top 10 2017
Sensitive Data Exposure
XML External Entities
Broken Access Control
Using Components with Known Vulnerabilities
Insufficient Logging & Monitoring
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.