OWASP Top 10 & Common Attack Vectors with TypeScript (1-5)
Application Security
5 courses
68 practices
10 hours
This learning path introduces new graduates to web application security through OWASP Top 10 vulnerabilities (1–5). Using TypeScript, learners practice identifying and fixing common security issues in a simple web app to build strong, practical skills.
This course addresses flaws where improper enforcement of access restrictions allows unauthorized users to access or modify sensitive data or functionality, such as paste snippets or administrative pages, due to unverified input or missing role checks.
Be a part of our community of 1M+ users who develop and demonstrate their skills on CodeSignal
From our community
Hear what our customers have to say about CodeSignal Learn
I'm impressed by the quality and can't stop recommending it. It's also a lot of fun!
Francisco Aguilar Meléndez
Data Scientist
+11
I love that it's personalized. When I'm stuck, I don't have to hope my Google searches come out successful. The AI mentor Cosmo knows exactly what I need.
Faith Yim
Software Engineer
+14
It's an amazing product and exceeded my expectations, helping me prepare for my job interviews. Hands-on learning requires you to actually know what you are doing.
Alex Bush
Full Stack Engineer
+9
I'm really impressed by the AI tutor Cosmo's feedback about my code. It's honestly kind of insane to me that it's so targeted and specific.
Abbey Helterbran
Tech consultant
+8
I tried Leetcode but it was too disorganized. CodeSignal covers all the topics I'm interested in and is way more structured.
Jonathan Miller
Senior Machine Learning Engineer
+12
I'm impressed by the quality and can't stop recommending it. It's also a lot of fun!
Francisco Aguilar Meléndez
Data Scientist
+11
11 practices
This course explores vulnerabilities caused by improper cryptographic implementations or lack of encryption, leading to sensitive data exposure. You’ll learn how attackers exploit weak cryptography and how to securely protect secrets, passwords, and sensitive information.
This course demonstrates how injection flaws occur when untrusted data is used to construct queries or commands, and how parameterization or input validation can mitigate these risks in our pastebin application.
This course explores design flaws that lead to security vulnerabilities in our pastebin application—from insecure credential recovery to flawed business logic and missing audit trails.
This course highlights configuration errors—from leftover sample endpoints and directory listing to detailed error messages —that can expose the pastebin application to attackers.