This course will be retired on June 1, 2025.
Heads up! To view this whole video, sign in with your Courses account or enroll in your free 7-day trial. Sign In Enroll
Well done!
You have completed OWASP Top 10 Vulnerabilities!
You have completed OWASP Top 10 Vulnerabilities!
Preview
OWASP is a non-profit organization dedicated to web security around the world, and includes thousands of volunteers from the security community at large.
New Terms:
- OWASP: Open Web Application Security Project is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Their mission is to make software security visible, so that individuals and organizations are able to make informed decisions.
Further Reading:
Related Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign upRelated Discussions
Have questions about this video? Start a discussion with the community and Treehouse staff.
Sign up
Starting in 2001, the open web application
security project, or OWASP for
0:00
short, is a non profit,
community based organization
0:05
dedicated to enhancing web
security across the entire world.
0:08
OWASP evolved from the desire
of a few active security members
0:12
to combine the knowledge required
to protect modern web apps.
0:16
Today, OWASP has grown to
over 42,000 volunteers.
0:19
Former security directors of Mozilla,
McAfee, and
0:24
Intel sit on the board of directors.
0:27
And with the help of
thousands of volunteers,
0:29
OWASP publishes many documents,
wiki articles, reports, and
0:32
software tools helping
secure the modern web.
0:36
Major projects from OWASP
include the OWASP Top 10,
0:39
which is what we will
cover in this course.
0:42
The OWASP Software Assurance Maturity
Model which is committed to helping
0:44
organizations formulate and implement
a strategy for application security.
0:48
The OWASP Testing and Code Review guides,
which outline proper web app testing
0:53
strategies, as well as
proper code reviews.
0:57
And the Zed Attack Proxy,
which is an open source, and
0:59
widely used web application scanner and
vulnerability analysis tool.
1:03
In this course,
1:07
we will dive into the OWASP Top 10 project
in the context of Node.js and JavaScript.
1:08
Keep in mind though, the fixes for
1:13
these vulnerabilities can be adapted
to nearly any programming language.
1:15
In the next video, we'll dive into
exactly what the OWASP Top 10 is.
1:19
You need to sign up for Treehouse in order to download course files.
Sign upYou need to sign up for Treehouse in order to set up Workspace
Sign up