A developer who is able to create applications that are resistant to hacker attacks
- Describe the processes of each of the security risks below
- Describe common attacks that hackers can use for each security risk below
- Demonstrate how to perform attacks using the security risks below
- Demonstrate how to defend against attacks that exploit the security risks below
OWASP Security Risks:
- Injection
- Broken Authentication
- Sensitive Data Exposure
- OWASP Top 10 Docs{:target="_blank"}
- Top 10 Vulnerable Websites for Penetration Testing{:target="_blank"}
- Kontra{:target="_blank"}
- An Introduction to OWASP Top 10 Vulnerabilities{:target="_blank"}
- OWASP Top 10 Security Fundamentals{:target="_blank"}
- OWASP Top 10 2017{:target="_blank"}
- OWASP API Security Top 10 Webinar{:target="_blank"}
- From the OWASP Top Ten(s) to the OWASP ASVS{:target="_blank"}
Ask your mentor if you are ready for evaluation. Then, do one of the following:
- Schedule a live evaluation by clicking here to find a time on the calendar. After the evaluation, claim the badge.
or
- Record a screencast where you talk about and demonstrate each competency listed above. Make sure badge criteria and relevant tools are visible in the screen cast AND that your audio is good enough for the evaluator to hear. Upload the video to a service like Vimeo or Youtube (unlisted is fine) so that you can provide a public url for an evaluator to view. Claim the badge and include the video url in the evidence box.