Course Outline
A01:2025 - Broken Access Control
A02:2025 - Security Misconfiguration
A03:2025 - Software Supply Chain Failures
A04:2025 - Cryptographic Failures
A05:2025 - Injection
A06:2025 - Insecure Design
A07:2025 - Authentication Failures
A08:2025 - Software or Data Integrity Failures
A09:2025 - Security Logging and Alerting Failures
A10:2025 - Mishandling of Exceptional Conditions
A01:2025 Broken Access Control - Access control policies ensure that users cannot act beyond their intended permissions. Failures in this area typically result in unauthorized data disclosure, modification, or destruction, or allow users to perform business functions outside their authorized limits.
A02:2025 Security Misconfiguration - This occurs when a system, application, or cloud service is improperly configured from a security standpoint, thereby creating vulnerabilities.
A03:2025 Software Supply Chain Failures - These refer to breakdowns or compromises in the processes of building, distributing, or updating software. They are often caused by vulnerabilities or malicious modifications in third-party code, tools, or dependencies that the system relies upon.
A04:2025 Cryptographic Failures - Ideally, all data in transit should be encrypted at the transport layer (OSI layer 4). Previously, challenges like CPU performance and private key/certificate management were obstacles, but modern CPUs include instructions to accelerate encryption (e.g., AES support), and services like LetsEncrypt.org have simplified certificate management. Major cloud vendors now offer even more integrated certificate management services. Beyond securing the transport layer, it is crucial to identify data that requires encryption at rest and data needing additional protection in transit at the application layer (OSI layer 7). For instance, passwords, credit card numbers, health records, personal information, and business secrets require heightened protection, particularly if they fall under privacy regulations such as the EU's General Data Protection Regulation (GDPR) or standards like the PCI Data Security Standard (PCI DSS).
A05:2025 Injection - An injection vulnerability is a system flaw that allows an attacker to insert malicious code or commands (such as SQL or shell code) into a program’s input fields. This tricks the system into executing the code as if it were legitimate, potentially leading to severe consequences.
A06:2025 Insecure Design - Insecure design is a broad category representing various weaknesses, described as “missing or ineffective control design.” It is not the sole source of other Top Ten risk categories. It is important to distinguish between insecure design and insecure implementation. Design flaws and implementation defects differ in their root causes, the timing of their occurrence during development, and their remediation strategies. A secure design can still contain implementation defects that lead to exploitable vulnerabilities. Conversely, an insecure design cannot be resolved through perfect implementation because the necessary security controls were never established to defend against specific attacks. One contributing factor to insecure design is the absence of business risk profiling for the software or system being developed, leading to a failure to determine the required level of security design.
A07:2025 Authentication Failures - This vulnerability exists when an attacker successfully tricks a system into recognizing an invalid or incorrect user as legitimate.
A08:2025 Software or Data Integrity Failures - These failures relate to code and infrastructure that do not protect against invalid or untrusted code/data being treated as trusted. An example includes applications relying on plugins, libraries, or modules from untrusted sources, repositories, or content delivery networks (CDNs). An insecure CI/CD pipeline that lacks software integrity checks can introduce risks of unauthorized access, malicious code, or system compromise. Another example involves a CI/CD pipeline that retrieves code or artifacts from untrusted sources without verifying them (e.g., via signature checks) before use.
A09:2025 Security Logging & Alerting Failures - Without adequate logging and monitoring, attacks and breaches cannot be detected. Without alerting mechanisms, responding quickly and effectively to security incidents becomes extremely difficult. Insufficient logging, continuous monitoring, detection, and alerting for active response can occur at any time.
A10:2025 Mishandling of Exceptional Conditions - This occurs when programs fail to prevent, detect, and respond to unusual or unpredictable situations, resulting in crashes, unexpected behavior, and sometimes vulnerabilities. This involves one or more of the following failures: the application fails to prevent the unusual situation, fails to identify it as it happens, and/or responds poorly or not at all afterward.
We will discuss and present practical aspects of:
Broken Access Control
- Practical examples of broken access controls
- Secure access controls and best practices
Security Misconfiguration
- Real-world examples of misconfigurations
- Steps to prevent misconfiguration, including configuration management and automation tools
Cryptographic Failures
- Detailed analysis of cryptographic failures such as weak encryption algorithms or improper key management
- Importance of strong cryptographic mechanisms, secure protocols (SSL/TLS), and examples of modern cryptography in web security
Injection Attacks
- Detailed breakdown of SQL, NoSQL, OS, and LDAP injection
- Mitigation techniques using prepared statements, parameterized queries, and escaping inputs
Insecure Design
- We'll explore design flaws that can lead to vulnerabilities, like improper input validation
- We'll study strategies for secure architecture and secure design principles
Authentication Failures
- Common authentication issues
- Secure authentication strategies, like multi-factor authentication and proper session handling
Software and Data Integrity Failures
- Focus on issues like untrusted software updates and data tampering
- Safe update mechanisms and data integrity checks
Security Logging and Monitoring Failures
- Importance of logging security-relevant information and monitoring for suspicious activities
- Tools and practices for proper logging and real-time monitoring to detect breaches early
Requirements
- A foundational understanding of the web development lifecycle
- Experience in web application development and security practices
Target Audience
- Web Developers
- Technical Leaders
Testimonials (7)
That every technical lesson came with multiple practical exercises to nail down the concepts.
Andrei-Calin Bajea
Course - OWASP Top 10 2025
very dynamic and flexible training!
Valentina Giglio - Fincons SPA
Course - OWASP Top 10
Laboratory exercises
Pietro Colonna - Fincons SPA
Course - OWASP Top 10
The interactive components and examples.
Raphael - Global Knowledge
Course - OWASP Top 10
Hands-on approach and Trainer Knowledge
RICARDO
Course - OWASP Top 10
The knowledge of the trainer was phenomenal
Patrick - Luminus
Course - OWASP Top 10
exercises, even if outside of my comfort zone.