Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

OWASP Top 10 with Jim Manico

Course Authored by .

In this course, Jim Manico will walk attendees through the various items in the latest OWASP Top 10 and corresponding controls. Students will leverage modern applications to explore how the vulnerabilities work and how to find them.

On-Demand $150.00

Course Length: 4 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

In this course, Jim Manico will walk attendees through the various items in the latest OWASP Top 10 and corresponding controls. Students will leverage modern applications to explore how the vulnerabilities work and how to find them.

Whether you are a risk manager, an auditor, a cybersecurity professional, or maybe you are a software developer or simply curious on application security and looking for an introduction to the OWASP Top 10: This course is for you!

For each of the OWASP Top 10 risks, we are going to look at the key information security concepts, so that you better understand the definition of each risk. Then we are going to – together – define each risk – and we are going to do this in layman’s terms, so that you really understand each risk.

FAQ

Key Takeaways
Some of the best protection strategies that help avoid each OWASP Top 10 risk from materializing

The main challenges that cause each OWASP Top 10 risk

Examples of good and bad code for each OWASP Top 10 risk using pseudocode

Definition of each of the OWASP Top 10 risks

What are the key information security concepts required to understand each OWASP Top 10 risk

What are the OWASP Top 10 risks and how this list gets periodically updated

What is the OWASP Foundation and how you can be part of this open-source community
Who Should Take This Course
This course has no technical prerequisites, it is truly meant for everyone

Beginner web application and API developers

Risk managers and auditor looking to understand the OWASP Top 10 risks

Cybersecurity professionals looking for an introduction to the OWASP Top 10

About the Instructor

Pixel splash background
Jim Manico
Jim Manico
"Secure Coding Instructor"
Bio

Jim Manico is the Founder of Manicode Security, a company dedicated to providing expert training in secure coding and security engineering to software developers. His work at Manicode Security reflects his deep commitment to elevating software security standards in the industry. In addition to leading Manicode, Jim is actively involved in the tech startup ecosystem as an investor and advisor.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.