This course aims to teach learners about the OWASP top 10 in bite size modules, we will look at the OWASP top 10 vulnerabilities and mitigations available to any development environment. It is important to understand that this is the baseline set of security standards. Remembering that this knowledge can be reused across technology stacks. Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Controls Security Misconfigurations Cross-Site Scripting Insecure Deserialization Using Components with Known Vulnerabilities Insufficient Logging and Monitoring