Course Duration
1 Day

Cyber
Authorized Training

IT

Course cost:
£1,240.00

IT Certification Overview

This course aims to teach learners about the OWASP top 10 in bite size modules; we will look at the OWASP top 10 vulnerabilities and mitigations available to any development environment. Learners will be able to challenge for the Certified OWASP Security Fundamentals Exam, post course. It is important to understand that this is the baseline set of security standards. Remembering that this knowledge can be reused across technology stacks.

The course introduces AI security threats, OWASP LLMs, and OWASP for agentic systems, models, data, and prompts.

Newto Training Reviews

What Our Happy Alumni Say About Us

Prerequisites

There are no prerequisites for this course.

Note: This course does not cover hands-on coding. Additional courses, such as Secure by Design, can be found in our Secure Engineering pathway.

Learning Objectives

  • Explain the purpose of the OWASP Top 10
  • Explain how these vulnerabilities could be exploited
  • Outline potential impact and consequences of web-based attacks
  • Describe baseline mitigation steps and techniques to prevent common web and application-based attacks
  • Recognise causes and impacts of major web application risks
  • Learn from case studies of real-world vulnerabilities
  • Recommend preventive and detective security controls
  • Apply secure configuration and cloud audit practices
  • Understand SBOMs and software supply chain risk
  • Identify risks in AI-generated code and AI systems
  • Recognise vulnerabilities in LLM’s, MCP, and agentic AI applications
  • Identify ways to protect AI models, data, prompts, and infrastructure

Certified OWASP Security Fundamentals Course Content

Application Security (OWASP)

  • OWASP Top 10

    • What’s Changed & Why
    • OWASP Top 10 Proactive Controls

A01 Broken Access Control

  • What’s the Risk – Notable CWE’s
  • What to Check
  • Case Study #1
  • Case Study #2
  • Session Management
  • Insecure direct object references
  • Typical authorisation components
  • Using indirect references
  • When not to secure by URL

A02 Security Misconfiguration

  • What’s the Risk – Notable CWE’s
  • What to Check
  • Case Study
  • AWS S3 Bucket Audit Checklist
  • Azure Tenant (Entra ID) Audit Checklist
  • Valuable error messages
  • Leakage issues
  • Configuration files and sensitive data
  • Google Dorks to find config files

A03 Software Supply Chain Failures

  • What’s the Risk – Notable CWE’s
  • What to Check
  • Case Study #1
  • Case Study #2
  • Software Bill of Materials (SBOM) Ingredients

A04 Cryptographic Failures

  • What’s the Risk – Notable CWE’s
  • What to Check
  • Cryptographic Resilience (PQC)
  • Case Study

A05 Injection

  • What’s the Risk – Notable CWE’s
  • What to Check
  • Core Vulnerability Mechanism
  • Case Study
  • Key Prevention Strategies

A06 Insecure Design

  • What’s the Risk – Notable CWE’s
  • What to Check
  • Insecure Design Scenarios
  • Case Study
  • Key Prevention Strategies

A07 Authentication Failures

  • What’s the Risk – Notable CWE’s
  • What to Check
  • Common Vulnerabilities
  • Case Study #1
  • Case Study #2
  • Key Prevention Strategies

A08 Software or Data Integrity Failures

  • What’s the Risk – Notable CWE’s
  • What to Check
  • Key Vulnerability Areas
  • Key Data Integrity Principles (ALCOA+)
  • Core Pillars of Software Integrity
  • Key Technical Controls
  • Case Study
  • Key Prevention Strategies

A09 Logging & Alerting Failures

  • What’s the Risk – Notable CWE’s
  • What to Check
  • Case Study
  • Mitigation Strategies
  • Logging best practices
  • And what should not be logged?

A10 Mishandling of Exceptional Conditions

  • What’s the Risk – Notable CWE’s
  • Why this new category?
  • What to Check
  • Modern Attack Scenarios
  • Case Study
  • Key Prevention Strategies

OWASP Emerging Technology

  • Challenges of AI Generated software
  • OWASP Top 10 Large Language Model (LLM)

    • Prompt injection
    • Insecure output handling
    • Training data poisoning
    • Model denial of service
    • Supply chain vulnerabilities
    • Sensitive information disclosure
    • Insecure plugin design
    • Excessive agency
    • Overreliance
    • Model theft
  • OWASP Top 10 for Agentic Applications

    • Agent Goal Hijack
    • Tool Misuse & Exploitation
    • Identity & Privilege Abuse
    • Supply Chain Vulnerabilities
    • Unexpected Code Execution
    • Memory & Context Poisoning
    • Insecure Inter-Agent Comms
    • Cascading Failures
    • Human-Agent Trust Exploit
    • Rogue Agents
  • Model Context Protocol (MCP) Challenges & Mitigation
  • AI Resource Protection

Exams and assessments

Candidates will receive individual emails to access their AMPG candidate portal, typically available one week post exam. If you experience any issues, please contact the APMG technical help desk on 01494 4520450.

  • Duration: 45 minutes
  • Questions: 40, multiple choice (4 multiple choice answers only 1 of which is correct)
  • Pass Mark: 50%

Successful candidates will receive the Certified in OWASP Security Fundamentals digital badge via Credly.

Upcoming Dates

Dates and locations are available on request. Please contact us for the latest schedule.

Advance Your Career with Certified OWASP Security Fundamentals

Gain the skills you need to succeed. Enrol in Certified OWASP Security Fundamentals with Newto Training today.

New Year Offer 1st Feb - 28th Feb
UP TO 80% OFF
Sale ends in
00Days
00Hours
00Mins
00Secs
Claim Discount