2018 OWASP Top 10 PCI Training 2018 OWASP Top 10 PCI Training This course will give you an overview of the top IT threats facing Prepaid Program Managers today. Course Content Expand All | Collapse All Lessons Status 1 Introduction to OWASP 2021 2 Injection How to Prevent – Injection Example Scenarios – Injection More Resources – Injection 3 Broken Authentication How to Prevent – Broken Authentication Example Scenarios – Broken Authentication More Resources – Broken Authentication 4 Sensitive Data Exposure How to Prevent – Sensitive Data Exposure Example Scenarios – Sensitive Data Exposure More Resources – Sensitive Data Exposure 5 XML External Entities (XXE) How to Prevent – XML External Entities (XXE) Example Scenarios – XML External Entities (XXE) More Resources – XML External Entities (XXE) 6 Broken Access Control How to Prevent – Broken Access Control Example Scenarios – Broken Access Control More Resources – Broken Access Control 7 Security Misconfiguration How to Prevent – Security Misconfiguration Example Scenarios – Security Misconfiguration More Resources – Security Misconfiguration 8 Cross Site Scripting (XXS) How to Prevent – Cross Site Scripting (XXS) Example Scenario – Cross Site Scripting (XXS) More Resources – Cross Site Scripting (XXS) 9 Insecure Deserialization How to Prevent – Insecure Deserialization Example Scenarios – Insecure Deserialization More Resources – Insecure Deserialization 10 Using Components With Known Vulnerabilities How to Prevent – Using Components With Known Vulnerabilities Example Scenarios – Using Components With Known Vulnerabilities More Resources – Using Components With Known Vulnerabilities 11 Insufficient Logging And Monitoring How to Prevent – Insufficient Logging And Monitoring Example Scenarios – Insufficient Logging And Monitoring More Resources – Insufficient Logging And Monitoring 12 OWASP Conclusion About The Author Jake Posey