Secure coding with OWASP Top 10
This course from Junglemap helps developers understand and reduce the most critical security risks in web applications. Applications are complex, and many vulnerabilities arise from everyday development decisions. Cybercriminals do not focus on how an application is intended to work, but on how it can be misused. This course helps you recognise these risks and understand how to prevent them in practice.

The course builds a practical understanding of:
- how common vulnerabilities arise
- how attackers exploit weaknesses
- how to apply secure development practices
- how to design and build more secure applications
Secure coding and security awareness are key controls in standards such as ISO 27001 and GDPR Article 25. This course provides a strong foundation to support secure software development and reduce risk across your applications.
The course is based on the OWASP Top 10 and includes:
- Broken access control
- Security misconfiguration
- Software supply chain failures
- Cryptographic failures
- Injection
- Insecure design
- Authentication failures
- Software or Data integrity failures
- Logging and Alerting failures
- Mishandling of exceptional conditions
This course is only available in English.
Explore the rest of our courses

Information security awareness course for all employees
Our information security awareness training consists of 3-minute lessons on cyber security risks and how to counteract them, with topics such as social engineering, password and email safety, AI-manipulation, and how to avoid and handle ransomware attacks.

Privacy & GDPR course for all employees
Our Privacy awareness training covers what all employees need to know about privacy and privacy legislations such as the GDPR. The course consists of 10 content lessons, surveys and repetition quizzes, all designed to build and reinforce knowledge about privacy all year around.

Course in protection against AI manipulation
Our course on AI manipulation consists of short, 2–3-minute lessons on how we experience AI – both when we take the initiative ourselves and in situations where we may not even be aware of it. The course focuses on how AI technology is used by cybercriminals and the importance of keeping AI in mind in our daily lives.

















