Welcome to ONLC Training Centers

OWASP On-Demand: Comprehensive (Forgery, Phishing, Hacking, Controls)


Need a price quote?

Follow the link to our self-service price quote form to generate an email with a price quote.

OWASP On-Demand: Comprehensive (Forgery, Phishing, Hacking, Controls) Course Outline

**Note: This is an On-Demand Self-Study Course, 2 days of content, 6-months unlimited access, $195**
(Applicable State and Local taxes may be added for On-Demand purchases, depending on your location.)
You may take this course at any time; there are no set dates. The course covers Open Web Application Security Project (OWSAP) Forgery and Phishing, Avoiding Hacker Tricks, Proactive Controls, and Threats Fundamentals topics.

About This Course
This Online On-Demand (self-study) training course includes expert lectures, PowerPoint visuals, and demonstrations. You will be able to follow along and successfully complete the course by completing the quizzes and exams. You do not need to own the software for the course and will be able to access the course from any device, provided you have internet access.
When you purchase this OWSAP On-Demand course from ONLC you will receive a printed book to supplement your learning at no charge.

This course takes 2 days to complete and includes 8h 39m of video presentation.

Course Outline

Forgery and Phishing
Topic A: Cross-Site Request Forgery
Topic B: Vulnerable Components
Topic C: Redirects

Avoiding Hacker Tricks
Topic A: Introduction
Topic B: Know Your Threats
Topic C: Cross Site Scripting
Topic D: SQL Injection Attack
Topic E: Insecure Object Reference
Topic F: Integer Overflow

Proactive Controls
Chapter 01 - Controls 1-5
Topic A: Overview
Topic B: Verify Security
Topic C: Parameterize Queries
Topic D: Encode Data
Topic E: Validate Inputs
Topic F: Identity and Authentication Controls

Chapter 02 - Controls 6-10
Topic A: Implement Access Controls
Topic B: Protect Data
Topic C: Logging and Intrusion Detection
Topic D: Security Frameworks and Exception Handling

Threats Fundamentals
Chapter 01 - Understanding Threats
Topic A: OWASP Overview
Topic B: Top Ten Threats

Chapter 02 - Session Security
Topic A: Authentication and Session Threats
Topic B: Threat Examples

Chapter 03 - Security Misconfiguration
Topic A: Security Misconfiguration
Topic B: Misconfiguration Examples

Chapter 04 - Data Exposure and Cryptography
Topic A: Sensitive Data Exposure
Topic B: Insecure Cryptographic Storage
Topic C: Function Level Access Control

View outline in Word


Attend hands-on, instructor-led OWASP On-Demand: Comprehensive (Forgery, Phishing, Hacking, Controls) training classes at ONLC's more than 300 locations. Not near one of our locations? Attend these same live classes from your home/office PC via our Remote Classroom Instruction (RCI) technology.

For additional training options, check out our list of Security Courses and select the one that's right for you.


Class Format
Class Policies
Student Reviews

First Name

Last Name