A7 and A6: Leaky and Unprepared Applications
OWASP
| Intermediate
- 18 videos | 1h 1m 7s
- Includes Assessment
- Earns a Badge
OWASP Top 10 list items 7 and 6 involve applications that expose sensitive data and are not protected from modern attacks.
WHAT YOU WILL LEARN
-
Describe what insufficient attack protection isExploit insufficient attack protection and what kind of access is needed to exploit itUse nmap to scan a networkDetect insufficient attack protection and note how common it isUse online web app scannersDescribe the client/server http exchangeAnalyze linux log rotation files for a linux web serverList the technical and business impacts of insufficient attack protectionDiscuss attacks that take advantage of insufficient attack protection
-
Describe what sensitive data exposure isAnalyze sensitive network traffic in linuxDescribe how sensitive data exposure can be exploitedReview how sensitive data exposure can be exploited and what kind of access is needed to exploit itDescribe how easy it is to detect sensitive data exposure and how common it isList the technical and business impacts of sensitive data exposureDescribe how various attacks can result in sensitive data exposureProvide examples of sensitive data exposure attacksDescribe the impact of these exploits on the business and technical sides
IN THIS COURSE
-
6m 33sAfter completing this video, you will be able to describe what insufficient attack protection is. FREE ACCESS
-
3m 31sDuring this video, you will learn how to exploit insufficient attack protection and what kind of access is needed to exploit it. FREE ACCESS
-
3m 11sIn this video, find out how to use nmap to scan a network for open ports. FREE ACCESS
-
5m 50sIn this video, you will detect insufficient attack protection and note how common it is. FREE ACCESS
-
2m 19sFind out how to use online web app scanners. FREE ACCESS
-
3m 56sUpon completion of this video, you will be able to describe the HTTP exchange between a client and a server. FREE ACCESS
-
2m 12sLearn how to analyze Linux log rotation files for a Linux web server. FREE ACCESS
-
4m 32sAfter completing this video, you will be able to list the technical and business impacts of insufficient attack protection. FREE ACCESS
-
4m 12sLearn how to discuss attacks that take advantage of insufficient protection. FREE ACCESS
-
4m 15sAfter completing this video, you will be able to describe what sensitive data exposure is and how to prevent it. FREE ACCESS
-
1m 26sIn this video, you will learn how to analyze sensitive network traffic in Linux. FREE ACCESS
-
3m 12sUpon completion of this video, you will be able to describe how sensitive data exposure can lead to exploitation. FREE ACCESS
-
3m 28sIn this video, you will review how sensitive data exposure can be exploited and what kind of access is needed to exploit it. FREE ACCESS
-
2mAfter completing this video, you will be able to describe how easy it is to detect sensitive data exposure and how common it is. FREE ACCESS
-
1m 27sUpon completion of this video, you will be able to list the technical and business impacts of sensitive data exposure. FREE ACCESS
-
3m 40sAfter completing this video, you will be able to describe how various attacks can result in the exposure of sensitive data. FREE ACCESS
-
2m 33sAfter completing this video, you will be able to provide examples of sensitive data exposure attacks. FREE ACCESS
-
2m 51sUpon completion of this video, you will be able to describe the impact of these exploits on the business and technical sides. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.