CUSTOMISED
Expert-led training for your team
Dismiss

OWASP Top 10 Practical Web Application Security training course

This intensive two-day hands-on course equips developers, architects and security champions with the practical skills needed to identify, exploit and prevent the most critical web application risks in the OWASP Top 10:2025.

JBI training course London UK

"Our tailored course provided a well rounded introduction and also covered some intermediate level topics that we needed to know. Clive gave us some best practice ideas and tips to take away. Fast paced but the instructor never lost any of the delegates"

Brian Leek, Data Analyst, May 2022

Public Courses

16/04/26 - 2 days
£1800 +VAT
18/05/26 - 2 days
£1800 +VAT
29/06/26 - 2 days
£1800 +VAT

Customised Courses

* Train a team
* Tailor content
* Flex dates
From £1200 / day
EDF logo Capita logo Sky logo NHS logo RBS logo BBC logo CISCO logo
JBI training course London UK

  • Course Introduction, OWASP Top 10:2025 Overview & Lab Setup
  • A01:2025 Broken Access Control
  • A02:2025 Security Misconfiguration
  • A03:2025 Software Supply Chain Failures
  • A04:2025 Cryptographic Failures
  • A05:2025 Injection
  • A06:2025 Insecure Design
  • A07:2025 Authentication Failures
  • A08:2025 Software or Data Integrity Failures
  • A09:2025 Security Logging & Alerting Failures
  • A10:2025 Mishandling of Exceptional Conditions
  • Synthesis, Risk Prioritisation & Building a Continuous AppSec Programme

Module 1 — Course Introduction, OWASP Top 10:2025 Overview & Lab Setup

09:30 to 10:30

  • Introductions, learning objectives and delegate expectations survey
  • What is OWASP and why does the Top 10 matter? Methodology behind the 2025 edition
  • Key changes from 2021 to 2025: what moved, what is new (A03 Supply Chain, A10 Exceptional Conditions), and what was consolidated (SSRF rolled into A01)
  • Understanding how OWASP balances data-driven ranking with community survey input
  • Connecting to and navigating the hands-on lab environment; verifying tool access

Morning Break 1: 15 mins — 10:30 to 10:45

 

Module 2 — A01:2025 Broken Access Control

10:45 to 11:45

  • Understanding access control as the #1 risk across 3.73% of tested applications (40 CWEs)
  • Common failure patterns: insecure direct object references (IDOR), missing function-level access control, path traversal and directory listing
  • Server-Side Request Forgery (SSRF): why it has been consolidated into Broken Access Control and how to exploit and prevent it
  • Privilege escalation scenarios: vertical and horizontal
  • Hands-on lab: exploiting IDOR and SSRF vulnerabilities in a deliberately vulnerable application; applying URL-based and role-based access control fixes

Morning Break 2: 15 mins — 11:45 to 12:00


Module 3 — A02:2025 Security Misconfiguration

12:00 to 13:00

  • Why Security Misconfiguration climbed from #5 in 2021 to #2 in 2025: the role of infrastructure-as-code and configuration-heavy modern stacks
  • Common misconfiguration categories: default credentials, unnecessary features/services enabled, verbose error messages, missing security headers, cloud storage exposure and XML External Entity (XXE) processing
  • Misconfiguration in containers, Kubernetes and cloud environments
  • Hands-on lab: using automated scanners (Nikto, Nuclei) to identify misconfigurations; hardening an NGINX configuration and reviewing HTTP security response headers with securityheaders.com

Lunch Break: 60 mins — 13:00 to 14:00

 

Module 4 — A03:2025 Software Supply Chain Failures

14:00 to 15:00

  • Understanding the expanded scope from "Vulnerable and Outdated Components" (A06:2021) to the full software supply chain: dependencies, build systems, registries and distribution infrastructure
  • Case studies: SolarWinds, Log4Shell, XZ Utils backdoor and dependency confusion attacks
  • Understanding Software Bills of Materials (SBOMs) and their role in supply chain transparency
  • Tools and practices: Software Composition Analysis (SCA), dependency pinning, signed artefacts, SLSA framework levels
  • Hands-on lab: running OWASP Dependency-Check against a sample project; interpreting CVE findings and applying remediation strategies; reviewing a basic SBOM

Afternoon Break 1: 15 mins — 15:00 to 15:15


Module 5 — A04:2025 Cryptographic Failures

15:15 to 16:15

  • Cryptographic Failures in context: still in the top 4 despite falling from #2, affecting ~3.80% of applications (32 CWEs)
  • Data sensitivity classification: identifying what data requires cryptographic protection at rest and in transit
  • Common failure patterns: use of weak or deprecated algorithms (MD5, SHA-1, DES, RC4), hard-coded secrets, insufficient key lengths, improper certificate validation and cleartext storage of sensitive data
  • Password storage: why hashing is not enough — understanding salting, stretching and modern password hashing functions (bcrypt, Argon2, scrypt)
  • Practical TLS considerations for application developers (complementing infrastructure-level TLS configuration)
  • Hands-on lab: identifying cryptographic weaknesses using static analysis; replacing weak hashing implementations; configuring secrets management using environment variables and a vault-style store

Afternoon Break 2: 15 mins — 16:15 to 16:30

 
 

Module 6 — A05:2025 Injection

16:30 to 17:30

  • Injection in 2025: still a major risk (38 CWEs) ranging from high-frequency/lower-impact Cross-Site Scripting (XSS) to lower-frequency/high-impact SQL Injection
  • Attack taxonomy: SQL Injection, OS Command Injection, LDAP Injection, XPath Injection, Server-Side Template Injection (SSTI) and Prompt Injection in AI-integrated applications
  • The root cause: untrusted data interpreted as commands or queries
  • Defence strategies: parameterised queries and prepared statements, input validation, output encoding and the principle of least privilege for database accounts
  • Hands-on lab: exploiting SQL Injection using manual techniques and sqlmap; demonstrating stored and reflected XSS; applying parameterised queries and context-sensitive output encoding as fixes

End of Day 1 — 17:30


Day 2 of 2 — "Security Architecture & Design Best Practices"

Theme: The five OWASP Top 10:2025 risks rooted in architecture, identity, integrity and operational response, covering A06–A10, followed by programme-level synthesis.

 



Module 7 — A06:2025 Insecure Design

09:30 to 10:30

  • Distinguishing insecure design from insecure implementation: why fixing code is not enough when the design itself is flawed
  • Recap of progress since 2021: improved industry awareness of threat modelling and secure-by-design principles
  • Secure design patterns: defence in depth, least privilege, fail securely, separation of duties, economy of mechanism
  • Abuse case and misuse case modelling: thinking like an attacker at the design stage
  • Introduction to threat modelling methodologies: STRIDE, PASTA and threat modelling with OWASP Threat Dragon
  • Hands-on lab: structured threat modelling exercise against a provided application architecture diagram; identifying design-level weaknesses and proposing security controls before a line of code is written

Morning Break 1: 15 mins — 10:30 to 10:45


Module 8 — A07:2025 Authentication Failures

10:45 to 11:45

  • From "Identification and Authentication Failures" (2021) to "Authentication Failures" (2025): a tighter focus on 36 CWEs
  • Common failure patterns: credential stuffing, brute force, weak or absent multi-factor authentication (MFA), insecure session management, predictable tokens and insecure "remember me" functionality
  • The positive trend: standardised frameworks (OAuth 2.0, OpenID Connect, FIDO2/WebAuthn, passkeys) reducing occurrence rates
  • Session lifecycle management: secure creation, transmission, timeout and invalidation
  • Hands-on lab: demonstrating credential stuffing using a wordlist attack; bypassing weak MFA implementations; reviewing and hardening session cookie attributes (Secure, HttpOnly, SameSite); implementing account lockout and rate limiting

Morning Break 2: 15 mins — 11:45 to 12:00


Module 9 — A08:2025 Software or Data Integrity Failures

12:00 to 13:00

  • Distinguishing A08 from A03: A08 focuses on trust boundary failures at the artefact and data level, where A03 addresses the broader supply chain ecosystem
  • Failure patterns: insecure deserialisation of untrusted data, missing integrity checks on software updates, auto-update mechanisms without signature verification and CI/CD pipeline manipulation
  • The role of code signing: signing commits, container images and release artefacts
  • CI/CD pipeline security: protecting build secrets, enforcing pipeline-as-code reviews and detecting tampering
  • Hands-on lab: demonstrating an insecure deserialisation attack; verifying artefact integrity using cryptographic checksums and digital signatures; reviewing a sample CI/CD pipeline configuration for integrity weaknesses

Lunch Break: 60 mins — 13:00 to 14:00

 

 

Module 10 — A09:2025 Security Logging & Alerting Failures

14:00 to 15:00

  • Why "Logging and Monitoring" became "Logging and Alerting": the critical distinction between capturing events and acting on them
  • What to log: authentication events, access control failures, input validation failures and high-value business transactions — and what not to log (PII, credentials, payment data)
  • Log integrity and centralisation: protecting logs from tampering, shipping to a SIEM, log retention policies
  • Alerting design: defining thresholds, avoiding alert fatigue, building meaningful dashboards
  • Mapping logs to the MITRE ATT&CK framework for detection engineering
  • Hands-on lab: configuring structured (JSON) application logging in a sample application; writing detection rules in a SIEM query language; simulating an attack scenario and validating that the alert fires correctly

Afternoon Break 1: 15 mins — 15:00 to 15:15

 


Module 11 — A10:2025 Mishandling of Exceptional Conditions (New for 2025)

15:15 to 16:15

  • Introduction to this new category (24 CWEs): what prompted its inclusion and the real-world failures it captures
  • Core failure patterns: improper error handling revealing stack traces or internal paths; failing open (granting access on error) versus failing secure (denying access on error); unchecked return values; integer overflows and numeric edge cases; logical errors under unexpected input
  • The principle of failing securely: designing systems that default to a safe state when exceptions occur
  • Error messages for users versus error detail for developers: building a two-tier error handling strategy
  • Exceptional conditions in AI and LLM-integrated applications: prompt injection edge cases, unexpected model outputs and graceful degradation
  • Hands-on lab: reviewing code samples exhibiting common exceptional-condition failures; refactoring error handling to fail securely; writing and running unit tests that deliberately trigger boundary and error conditions

Afternoon Break 2: 15 mins — 16:15 to 16:30

 

 

Module 12 — Synthesis, Risk Prioritisation & Building a Continuous AppSec Programme

16:30 to 17:30

  • Reflecting on the full OWASP Top 10:2025: consolidating learning across both days and connecting the ten risks into a coherent security narrative
  • Risk-based prioritisation: mapping the Top 10 to your organisation's technology stack, threat model and regulatory context
  • Embedding security in the SDLC: security requirements, secure design review, SAST/DAST/SCA in CI/CD, penetration testing and bug bounty programmes
  • Signposting trusted continuous learning resources: OWASP projects (ASVS, WSTG, Cheat Sheet Series, Threat Dragon, Dependency-Check), SANS, PortSwigger Web Security Academy, CVE/NVD feeds
  • Flowing security requirements to third parties: contractual clauses, supplier questionnaires and software assurance expectations
  • Completing end-of-course feedback survey to improve future iterations
  • Q&A and close

 

JBI training course London UK

Target audience: Software engineers, architects, security champions, testers and technical leads responsible for designing, building or assessing web applications.

Prerequisites: Basic familiarity with web technologies (HTTP, browsers, APIs). No prior security experience required.

Lab environment: Browser-accessible, pre-provisioned virtual lab (details provided before course).


5 star

4.8 out of 5 average

"Our tailored course provided a well rounded introduction and also covered some intermediate level topics that we needed to know. Clive gave us some best practice ideas and tips to take away. Fast paced but the instructor never lost any of the delegates"

Brian Leek, Data Analyst, May 2022



“JBI  did a great job of customizing their syllabus to suit our business  needs and also bringing our team up to speed on the current best practices. Our teams varied widely in terms of experience and  the Instructor handled this particularly well - very impressive”

Brian F, Team Lead, RBS, Data Analysis Course, 20 April 2022

 

 

JBI training course London UK

Newsletter


Sign up for the JBI Training newsletter to receive technology tips directly from our instructors - Analytics, AI, ML, DevOps, Web, Backend and Security.
 



Combining clear technical explanations with guided lab exercises, delegates work through real-world vulnerabilities including Broken Access Control, Injection, Cryptographic Failures, Supply Chain risks, Authentication weaknesses and the new 2025 category: Mishandling of Exceptional Conditions. Each module demonstrates how attacks work in practice — and, crucially, how to fix them using secure design principles, modern frameworks and proven defensive techniques.

By the end of the course, attendees will understand not just individual vulnerabilities, but how to embed security into architecture, development pipelines and operational monitoring — enabling teams to build and maintain secure web applications with confidence.

CONTACT
+44 (0)20 8446 7555

[email protected]

SHARE

 

Copyright © 2025 JBI Training. All Rights Reserved.
JB International Training Ltd  -  Company Registration Number: 08458005
Registered Address: Wohl Enterprise Hub, 2B Redbourne Avenue, London, N3 2BS

Modern Slavery Statement & Corporate Policies | Terms & Conditions | Contact Us

POPULAR

AI training courses                                                                        CoPilot training course

Threat modelling training course   Python for data analysts training course

Power BI training course                                   Machine Learning training course

Spring Boot Microservices training course              Terraform training course

Data Storytelling training course                                               C++ training course

Power Automate training course                               Clean Code training course