Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

OWASP: Broken Access Control

Broken Access Control remains one of the most exploited security risks today. This course will teach you how to identify, test, and prevent the latest OWASP Top 10 access control vulnerabilities with confidence.

Intermediate
42m

Created by Gavin Johnson-Lynn

Last Updated Dec 23, 2025

Course Thumbnail
  • Course

OWASP: Broken Access Control

Broken Access Control remains one of the most exploited security risks today. This course will teach you how to identify, test, and prevent the latest OWASP Top 10 access control vulnerabilities with confidence.

Intermediate
42m

Created by Gavin Johnson-Lynn

Last Updated Dec 23, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Broken access control flaws are among the most common and dangerous vulnerabilities in modern applications, often leading to data leaks, account compromise, and unauthorized actions. In this course, OWASP: Broken Access Control, you’ll learn to recognize, test, and prevent the most critical access control weaknesses defined in the latest OWASP Top 10. First, you’ll explore how access control works, why it fails, and how to spot broken patterns in real applications. Next, you’ll discover practical testing techniques—both manual and automated—for uncovering IDORs, privilege escalation paths, and other access control flaws. Finally, you’ll learn how to implement secure, scalable access control patterns that eliminate these vulnerabilities at their root. When you’re finished with this course, you’ll have the skills and knowledge of broken access control required to confidently identify, exploit, and remediate these issues in any application.

OWASP: Broken Access Control
Intermediate
42m
Table of contents

About the author
Gavin Johnson-Lynn - Pluralsight course - OWASP: Broken Access Control
Gavin Johnson-Lynn
18 courses 4.5 author rating 358 ratings

Gavin is passionate about security and has an extensive background in software development in regulated environments. He currently works in a Red Team at a FTSE 100 company.

2025 Forrester Wave™ names Pluralsight as a Leader among tech skills dev platforms

See how our offering and strategy stack up.

forrester wave report