Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course

OWASP: Authentication Failures

Attackers target authentication first. This course will teach you how authentication attacks succeed, why MFA and tokens matter, and how to think critically about login and session security risks.

Intermediate
1h

Created by Mohammad Ayashi

Last Updated Jan 22, 2026

Course Thumbnail
  • Course

OWASP: Authentication Failures

Attackers target authentication first. This course will teach you how authentication attacks succeed, why MFA and tokens matter, and how to think critically about login and session security risks.

Intermediate
1h

Created by Mohammad Ayashi

Last Updated Jan 22, 2026

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Authentication is the front door to every application and the attackers’ favorite entry point. Misunderstanding its failure modes leads to poor risk decisions, weak defenses, and false confidence in security controls. In this course, OWASP: Authentication Failures, you’ll learn to analyze, understand, and evaluate authentication security from an attacker and defender perspective. First, you’ll explore how weak passwords, credential stuffing, and session fixation attacks work in practice and why they are so effective. Next, you’ll discover how modern authentication concepts such as MFA, secure password storage, and token-based authentication reduce real-world risk. Finally, you’ll learn how to assess login and session protections such as rate limiting, session timeouts, and secure cookie handling as part of a layered defense strategy. When you’re finished with this course, you’ll have the skills and knowledge of different authentication failure scenarios needed to confidently evaluate authentication security, recognize high-risk design flaws, and make informed security decisions in real-world environments.

OWASP: Authentication Failures
Intermediate
1h
Table of contents

About the author
Mohammad Ayashi - Pluralsight course - OWASP: Authentication Failures
Mohammad Ayashi
2 courses 0.0 author rating 0 ratings

With 15+ years in IT security and software development, Mohammad specializes in cloud and container security and has presented globally on topics from hypervisors to leadership.

2025 Forrester Wave™ names Pluralsight as a Leader among tech skills dev platforms

See how our offering and strategy stack up.

forrester wave report