// owasp_hub / training_paths

Training Paths

Structured learning paths built from official OWASP projects, guides, and tools. Pick a path, follow the resources, and level up.

[ browse all OWASP projects ↗ ]
//
LEVEL
// 10 paths available

New to AppSec?

Start your security journey from zero

Beginner

No prior security experience needed. Learn core web vulnerabilities hands-on using OWASP's beginner-friendly tools and the canonical Top 10 awareness list.

OWASP Top 10Vulnerable appsGamified challengesCore concepts20–40 h
// resources
FlagshipTop 10OWASP Top 10 (Web 2021)
FlagshipToolOWASP Juice Shop
FlagshipToolWebGoat
LabToolSecurity Shepherd

Developer Training

Security skills built for software engineers

Beginner

Structured lessons for developers to learn secure coding. Covers injection, auth flaws, misconfigurations, and more through guided exercises and the SKF knowledge framework.

Secure codingASVS requirementsInteractive lessonsKnowledge framework30–50 h
// resources
FlagshipToolWebGoat
FlagshipToolSecurity Knowledge Framework (SKF)
LabToolWrongSecrets
FlagshipStandardASVS

Securing APIs

From API Top 10 to runtime protection

Intermediate

Deep-dive into API-specific attack vectors. Covers authentication flaws, excessive data exposure, broken object-level authorization, and how to test and remediate each.

API Top 10Auth & authzRate limitingInput validation15–25 h
// resources
FlagshipTop 10OWASP API Security Top 10 (2023)
FlagshipCheat SheetREST Security Cheat Sheet
FlagshipCheat SheetGraphQL Cheat Sheet
LabToolAPICheck

Mobile App Security

iOS & Android security testing end-to-end

Intermediate

The complete OWASP mobile security curriculum: risks, testing methodology, and automated analysis. Covers both iOS and Android platforms with the MASTG and MobSF.

Mobile Top 10MASTG methodologyStatic & dynamic analysisPlatform-specific risks25–40 h
// resources
FlagshipTop 10OWASP Mobile Top 10 (2024)
FlagshipGuideMASTG (Mobile App Security Testing Guide)
FlagshipStandardMobile Application Security Verification Standard (MASVS)
LabToolMobSF

Build an AppSec Program

Mature your organization's security posture

Advanced

Learn how to design, measure, and scale an AppSec program using OWASP SAMM's maturity model and ASVS as a verification standard. Ideal for security leads and architects.

Maturity modelRisk assessmentASVS verificationDevSecOps integration40–80 h
// resources
FlagshipStandardOWASP SAMM (Software Assurance Maturity Model)
FlagshipStandardASVS
IncubatorGuideDevSecOps Guideline
IncubatorGuideAppSec Pipeline

Supply Chain Security

Secure your dependencies and CI/CD pipelines

Intermediate

Address risks in open-source dependencies, build pipelines, and software bills of materials. Uses OWASP's CI/CD Top 10 and Dependency-Check as the core tools.

SCASBOMCI/CD risksDependency hygiene15–20 h
// resources
FlagshipTop 10OWASP Top 10 CI/CD Security Risks
FlagshipToolOWASP Dependency-Check
FlagshipToolCycloneDX
LabStandardSoftware Component Verification Standard (SCVS)

Penetration Testing

Structured web app testing from recon to report

Advanced

Follow the WSTG methodology across all 12 testing categories, automate discovery with ZAP and Amass, and learn to document findings professionally.

WSTG methodologyAutomated scanningManual testingReporting50–80 h
// resources
FlagshipGuideWeb Security Testing Guide (WSTG)
FlagshipToolOWASP ZAP
FlagshipToolOWASP Amass
FlagshipCheat SheetTesting Cheat Sheet

Cloud & Container Security

Secure modern infrastructure from IaC to runtime

Intermediate

Covers OWASP's Cloud-Native Top 10, Docker and Kubernetes security cheat sheets, and threat modeling for cloud workloads.

Cloud-Native Top 10Container hardeningIaC securityThreat modeling20–30 h
// resources
IncubatorTop 10OWASP Cloud-Native Top 10
FlagshipCheat SheetDocker Security Cheat Sheet
FlagshipCheat SheetKubernetes Security Cheat Sheet
FlagshipToolThreat Dragon

LLM & AI Security

Secure AI-powered applications and LLM integrations

Intermediate

The newest OWASP frontier. Learn the 10 critical risks in LLM applications prompt injection, data poisoning, insecure output handling and how to mitigate them.

LLM Top 10Prompt injectionAI governanceOutput validation10–20 h
// resources
FlagshipTop 10OWASP Top 10 for LLM Applications (2025)
LabGuideLLM AI Security & Governance Checklist
LabCheat SheetAI Security Cheat Sheet

Threat Modeling

Design-time security analysis for any system

Intermediate

Learn structured threat modeling with OWASP Threat Dragon, pytm, and the dedicated cheat sheet. Identify, rate, and track threats before writing a line of code.

STRIDEAttack treesData flow diagramsRisk rating15–25 h
// resources
FlagshipToolThreat Dragon
FlagshipCheat SheetThreat Modeling Cheat Sheet
LabToolpytm
FlagshipCheat SheetAttack Surface Analysis Cheat Sheet