{"id":1193,"date":"2020-04-16T15:02:41","date_gmt":"2020-04-16T15:02:41","guid":{"rendered":"https:\/\/dcapps.tech\/freeudemy\/?p=1193"},"modified":"2020-04-16T15:02:45","modified_gmt":"2020-04-16T15:02:45","slug":"free-an-introduction-to-owasp-top-10-vulnerabilities","status":"publish","type":"post","link":"https:\/\/dc-apps.net\/freeudemy\/free-an-introduction-to-owasp-top-10-vulnerabilities\/","title":{"rendered":"[Free] An Introduction to OWASP Top 10 Vulnerabilities"},"content":{"rendered":"<div id=\"dcapp-360793590\" class=\"dcapp-before-content_2 dcapp-entity-placement\"><a href=\"https:\/\/t.me\/freeudmeyc\" aria-label=\"Join our Telegram Channel\"><img loading=\"lazy\" src=\"https:\/\/dc-apps.net\/freeudemy\/wp-content\/uploads\/2020\/03\/join-our-telegram-channel.png\" alt=\"Join our Telegram Channel\"  srcset=\"https:\/\/dc-apps.net\/freeudemy\/wp-content\/uploads\/2020\/03\/join-our-telegram-channel.png 700w, https:\/\/dc-apps.net\/freeudemy\/wp-content\/uploads\/2020\/03\/join-our-telegram-channel-300x71.png 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" width=\"700\" height=\"165\"  style=\"display: inline-block;\" \/><\/a><\/div><div id=\"dcapp-2300255552\" class=\"dcapp-before-content dcapp-entity-placement\" style=\"margin-bottom: 5px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7454916351629321\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7454916351629321\" \ndata-ad-slot=\"9119542394\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<p><strong>Learn the fundamentals of security<\/strong><\/p>\n\n\n\n<!--more-->\n\n\n\n<h3>Requirements<\/h3>\n\n\n\n<ul><li>A basic understanding of programming<\/li><\/ul>\n\n\n\n<p>Description<\/p>\n\n\n\n<p>The purpose of this course is to provide students with a fundamental understanding of computer security, through the study of the top 10 most common security vulnerabilities, as provided by OWASP.<\/p>\n\n\n\n<p>By the end of this course, students will have enough of an understanding to make design choices that preserve the security of the applications they own. This course can also serve as a way to gain foundations required to proceed to more advanced security topics. <\/p>\n\n\n\n<p>Who this course is for:<\/p><div id=\"dcapp-1054908432\" class=\"dcapp-content dcapp-entity-placement\" style=\"margin-top: 5px;margin-bottom: 5px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7454916351629321\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7454916351629321\" \ndata-ad-slot=\"3439662696\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n\n\n\n<ul><li>Beginner programmers and security researchers looking to learn about computer security<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-text-align-center has-large-font-size has-vivid-red-color\"><strong><a href=\"https:\/\/www.udemy.com\/course\/an-introduction-to-owasp-top-10-vulnerabilities\/\" class=\"aioseop-link\">Get the course<\/a><\/strong><\/p>\n<div id=\"dcapp-4074426209\" class=\"dcapp-after-content dcapp-entity-placement\" style=\"margin-top: 5px;margin-bottom: 5px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7454916351629321\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7454916351629321\" \ndata-ad-slot=\"1642816558\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Learn the fundamentals of security<\/p>\n","protected":false},"author":1,"featured_media":1194,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[1],"tags":[27,620,621],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/posts\/1193"}],"collection":[{"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/comments?post=1193"}],"version-history":[{"count":0,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/posts\/1193\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/media\/1194"}],"wp:attachment":[{"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/media?parent=1193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/categories?post=1193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dc-apps.net\/freeudemy\/wp-json\/wp\/v2\/tags?post=1193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}