01.01-2021 owasp top 10
01.02-what you should know
02.01-what is injection
02.02-example 1 2008 heartland data breach
02.03-example 2 2020 accellion data breach
02.04-prevention technique 1 prepared statements
02.05-prevention technique 2 input validation
02.06-prevention technique 3 escape special characters
03.01-what is insecure design
03.02-real-world example 1 g suite accounts in 2018
03.03-real-world example 2 2021 manufacturing data risk report
03.04-prevention technique 1 threat modeling
03.05-prevention technique 2 secure design patterns and principles
03.06-prevention technique 3 secure development lifecycle
04.01-next steps