phone
Hulp bij het zoeken en inschrijven

Stel je opleidingsvraag of gebruik de keuzehulp.

29 OWASP trainingen

Bekijk ook: Ethical Hacking, Cyber Security en Penetration testing.

Bekijk ook: Ethical Hacking, Cyber Security en Penetration testing.

check_box_outline_blank

Security Developer Awareness met OWASP top 10

Logo van Luminis

De online wereld staat tegenwoordig bol van de bedreigingen: datalekken en misbruik, veroorzaakt door bugs, slechte afscherming, of onderma…

check_box_outline_blank

OWASP-10 - Open Worldwide Application Security Project

Logo van OptiSec
placeDinsdag 10 maart 2026 in Pelmolenlaan, Woerden en 1 andere datum

Deze masterclass is perfect voor software developers en/of security consultants. Velen kennen de OWASP-10, maar weinig begrijpen deze echt …

check_box_outline_blank

Secure Coding Principles - OWASP Top 10 (Virtueel)

Logo van Vijfhart IT-Opleidingen

Lesmethode : Virtueel Algemeen : De Top 10 van het Open Web Application Security Project (OWASP) wordt internationaal door beveiligingsdesk…

check_box_outline_blank

Secure Coding Principles - OWASP Top 10

Logo van Vijfhart IT-Opleidingen
placeAlphen aan den Rijn, Amersfoort en 4 andere regio's

Lesmethode : Klassikaal Algemeen : De Top 10 van het Open Web Application Security Project (OWASP) wordt internationaal door beveiligingsde…

check_box_outline_blank

OWASP Proactive Controls

Logo van icttrainingen.nl

OWASP is een internationale organisatie die zich richt op het verbeteren van softwarebeveiliging. Deze training gaat over de OWASP Top 10 P…

check_box_outline_blank

OWASP Top 10

Logo van icttrainingen.nl

In deze training leer je alles over de OWASP Top 10. Dit is een standaard bewustwordingsdocument voor ontwikkelaars en webapplicatiebeveili…

check_box_outline_blank

Learning the OWASP Top 10

Logo van IT-Learning

No organization—no matter how large or small—is invulnerable to security breaches. What makes all of these systems, and the software th…

check_box_outline_blank

The OWASP API 2023 Top 10: An Overview

Logo van IT-Learning

With more applications becoming more API driven, they are also becoming more vulnerable to major attacks. This course teaches tech professi…

check_box_outline_blank

The OWASP Top 10 for Large Language Model (LLM) Applications: An Overview

Logo van IT-Learning

As artificial intelligence reshapes how we interact with technology, securing Large Language Models (LLMs) and their surrounding ecosystems…

check_box_outline_blank

OWASP Top 10: #7 XSS and #8 Insecure Deserialization

Logo van IT-Learning

Recent changes in application architecture and technology have sparked new opportunities and ways of working. But with these new advancemen…

check_box_outline_blank

OWASP Top 10: #9 Components with Known Vulnerabilities and #10 Insufficient Logging and Monitoring

Logo van IT-Learning

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

OWASP Top 10: #1 Injection and #2 Broken Authentication

Logo van IT-Learning

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand and improve software se…

check_box_outline_blank

OWASP Top 10: #3 Sensitive Data Exposure and #4 External Entities (XXE) (2019)

Logo van IT-Learning

The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understand and enhance soft…

check_box_outline_blank

Learning the OWASP Top 10 (2018)

Logo van IT-Learning

It seems like there is a security-related incident in the news every day. What makes systems—and the software that runs them—vulnerable…

check_box_outline_blank

OWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures

Logo van IT-Learning

Failures related to identity, authentication, and software and data integrity loom large in web application development. You need to keep s…