Featured resource
2026 Tech Forecast
2026 Tech Forecast

1,500+ tech insiders, business leaders, and Pluralsight Authors share their predictions on what’s shifting fastest and how to stay ahead.

Download the forecast
  • Course

OWASP: Software or Data Integrity Failures

Software and data integrity failures allow attackers to tamper with code, pipelines, and serialized data. This course will teach you how to identify these risks and implement integrity controls across your build and deployment processes.

Intermediate
1h 7m

Created by Alexander Tushinsky

Last Updated Apr 06, 2026

Course Thumbnail
  • Course

OWASP: Software or Data Integrity Failures

Software and data integrity failures allow attackers to tamper with code, pipelines, and serialized data. This course will teach you how to identify these risks and implement integrity controls across your build and deployment processes.

Intermediate
1h 7m

Created by Alexander Tushinsky

Last Updated Apr 06, 2026

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Modern applications are a collection of open-source libraries, third-party services, serialized data, and automated pipelines. Without integrity controls, any one of these components can be modified, replaced, or injected with malicious content, turning trusted software into an attack vector. Incidents like SolarWinds, Codecov, and the Equifax breach demonstrate the devastating consequences of integrity failures across code, data, and deployment processes. In this course, OWASP: Software or Data Integrity Failures, you'll learn how to identify and defend against integrity-related vulnerabilities across the software lifecycle. First, you'll explore how integrity failures occur, examining insecure deserialization, unverified auto-updates, and build-chain compromises that allow attackers to inject malicious code into trusted systems. Next, you'll discover how to implement integrity verification techniques, including checksums, digital signatures, code signing, and dependency management, to ensure only validated components enter your applications.

Finally, you'll learn how to secure CI/CD workflows using signed commits, trusted repositories, and change-validation gates to prevent unauthorized modifications from reaching production.

When you're finished with this course, you'll have the skills and knowledge of software and data integrity needed to protect your applications, pipelines, and data flows from tampering, ensuring that what you build and deploy is exactly what you intended.

OWASP: Software or Data Integrity Failures
Intermediate
1h 7m
Table of contents

About the author
Alexander Tushinsky - Pluralsight course - OWASP: Software or Data Integrity Failures
Alexander Tushinsky
15 courses 4.7 author rating 170 ratings

Alex has spent the past 30 years working as a software developer, application architect, cybersecurity professional, and technical trainer. He is a lifelong learner and holds over 20 active certifications in software development, project management, and cybersecurity. Alex is a CompTIA and Microsoft Certified Trainer and enjoys sharing his knowledge with others. He has taught at Rutgers University (NJ), Bergen Community College (NJ), County College of Morris (NJ), College of Southern Nevada, and UNLV.

2025 Forrester Wave™ names Pluralsight as a Leader among tech skills dev platforms

See how our offering and strategy stack up.

forrester wave report