business
Ook voor leren in je organisatie

Social learning met collega's.

21 OWASP trainingen

Bekijk ook: Ethical Hacking, Cyber Security en Penetration testing.

Bekijk ook: Ethical Hacking, Cyber Security en Penetration testing.

check_box_outline_blank

(OWASP) Top 10 - Secure Coding Fundamentals

Logo van Business Training N.V.

Writing web applications can be rather complex – reasons range from dealing with legacy technologies or under documented third-party compon…

check_box_outline_blank

Training OWASP top 10 - in de praktijk

Logo van Eduvision
placeOp locatie: vrijdag 2 januari 2026 in Antwerpen en 23 andere datums
computerOnline: vrijdag 2 januari 2026 en 5 andere datums

De OWASP top 10 is wereldwijd de meest gebruikte richtlijn voor het begrijpen en voorkomen van de belangrijkste kwetsbaarheden in webapplic…

check_box_outline_blank

OWASP Top 10 Essentials

Logo van OpenValue

Introduction OWASP is a worldwide organization focused on improving software security. For this goal they have built a list of the top 10 m…

check_box_outline_blank

OWASP Proactive Controls

Logo van icttrainingen.nl

OWASP is een internationale organisatie die zich richt op het verbeteren van softwarebeveiliging. Deze training gaat over de OWASP Top 10 P…

check_box_outline_blank

OWASP Top 10

Logo van icttrainingen.nl

In deze training leer je alles over de OWASP Top 10. Dit is een standaard bewustwordingsdocument voor ontwikkelaars en webapplicatiebeveili…

check_box_outline_blank

OWASP Top 10: #3 Injection and #4 Insecure Design

Logo van IT-Learning

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

Logo van IT-Learning

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

The OWASP API Security Top 10: An Overview

Logo van IT-Learning

Want to learn more about securing APIs? Check out the OWASP API Security Top 10, a list of security vulnerabilities compiled and published …

check_box_outline_blank

OWASP Top 10: #5 Security Misconfiguration and #6 Vulnerable and Outdated Components

Logo van IT-Learning

Security vulnerabilities should be top of mind when it comes to safely accessing web applications within an organization. There’s always …

check_box_outline_blank

The OWASP API 2023 Top 10: An Overview

Logo van IT-Learning

With more applications becoming more API driven, they are also becoming more vulnerable to major attacks. This course teaches tech professi…

check_box_outline_blank

Learning the OWASP Top 10

Logo van IT-Learning

No organization—no matter how large or small—is invulnerable to security breaches. What makes all of these systems, and the software th…

check_box_outline_blank

OWASP Top 10: #9 Security Logging and Monitoring Failures and #10 Server-Side Request Forgery

Logo van IT-Learning

It’s important to protect your organization against security vulnerabilities, but how do you prepare for a possible attack? In this cours…

check_box_outline_blank

The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview (2024)

Logo van IT-Learning

Ever since the release of ChatGPT, it seems like everyone is talking about large language models (LLMs). With the rapid adoption of this ex…

check_box_outline_blank

OWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures

Logo van IT-Learning

Failures related to identity, authentication, and software and data integrity loom large in web application development. You need to keep s…

check_box_outline_blank

OWASP Top 10: #7 XSS and #8 Insecure Deserialization

Logo van IT-Learning

Recent changes in application architecture and technology have sparked new opportunities and ways of working. But with these new advancemen…