A5 and A1: Security and Injection
OWASP
| Intermediate
- 13 videos | 1h 8m 42s
- Includes Assessment
- Earns a Badge
OWASP Top 10 list items 5 and 1 cover security misconfigurations and injection, two highly common attacks in modern web applications
WHAT YOU WILL LEARN
-
Explain what security misconfigurations areHow security misconfigurations can be exploited and what kind of access is needed to exploit itHow easy it is to detect security misconfigurations and how common they areThe technical and business impacts of security misconfigurationsProvide examples of security misconfiguration attacksEnable protection for a web app through a wafExplain what injection is
-
How injection can be exploited and what kind of access is needed to exploit itHow easy it is to detect injection and how common they areThe technical and business impacts of injection attacksProvide examples of injection attacksInject sql commands into a web form fieldExplain how a5 and a1 can be exploited by attackers
IN THIS COURSE
-
7m 30sAfter completing this video, you will be able to explain what Security Misconfigurations are. FREE ACCESS
-
6m 21sDuring this video, you will learn how Security Misconfigurations can be exploited and what kind of access is needed to exploit them. FREE ACCESS
-
7m 8sIn this video, you will learn how easy it is to detect Security Misconfigurations and how common they are. FREE ACCESS
-
6m 8sLearn how to mitigate the technical and business impacts of Security Misconfigurations. FREE ACCESS
-
7m 17sAfter completing this video, you will be able to provide examples of Security Misconfiguration attacks. FREE ACCESS
-
3m 53sDuring this video, you will learn how to enable protection for a web app through a web application firewall. FREE ACCESS
-
4m 26sAfter completing this video, you will be able to explain what Injection is. FREE ACCESS
-
5m 8sDuring this video, you will learn how Injection can be exploited and what kind of access is needed to exploit it. FREE ACCESS
-
4m 17sIn this video, learn how easy it is to detect Injection and how common they are. FREE ACCESS
-
3m 49sFind out how to mitigate the technical and business impacts of Injection attacks. FREE ACCESS
-
5m 57sAfter completing this video, you will be able to provide examples of Injection attacks. FREE ACCESS
-
3m 18sLearn how to inject SQL commands into a web form field. FREE ACCESS
-
3m 31sAfter completing this video, you will be able to explain how A5 and A1 can be exploited by attackers. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.