OWASP Top 10
![](./talk-1-owasp-top10/owasp-top10.png)
OWASP's "Ten Most Critical Web Application Security Risks"
Threat Modelling
![](./talk-2-threat-modelling/threat-modelling.png)
Security requirements analysis using misuse cases
Security Assignment
![](./talk-3-security-assignment/security_assignment.jpg)
This assignment requires you to prepare a report based mainly on your practical experience with web application security.
Lab-17 Misuse Cases
![](./book-1-misuse-cases/img/main.png)
The focus of this lab is this first part of the security assignment, which is broken down into the following steps: