Final Exam: OWASP Top 10 Mitigations
Intermediate
- 1 video | 32s
- Includes Assessment
- Earns a Badge
Final Exam: OWASP Top 10 Mitigations will test your knowledge and application of the topics presented throughout the Skillsoft Aspire Web App Vulnerability Analyst Journey.
WHAT YOU WILL LEARN
-
Differentiate between siem and soar monitoring and incident response solutionsmanage docker containers on a linux computerdescribe how the concept of objects, methods, and properties applies to scripting and software developmentconfigure and test snort ids rulesrecognize how security must be integrated into all aspects of continuous integration and continuous delivery (ci/cd)install the snort idsdeploy security controls to mitigate xss attacksinstall and configure windows server update services (wsus)describe how java and javascript are used in web applicationsconfigure syslog-ng in linux to forward log entries to a central logging hostdeploy security controls to correct monitoring deficienciesrecognize how cross-site scripting (xss) attacks occurapply security settings to users and computers using microsoft group policyrecognize how to deploy security controls to mitigate deserialization attacksdescribe how intrusion detection and prevention can be deployed and useddescribe how application containers worksearch vulnerable devices on the shodan.io websitebrowse vulnerable devices on the shodan.io websiteencrypt user credentialsdescribe how a web application firewall differs from other types of firewallshash files using windows commandsidentify how http requests and responses interact with web applicationsapply security controls to mitigate broken access control attackslist various ways that xml attacks can be executeddescribe what personally identifiable information (pii) is and how it relates to data classification and securitymitigate injection attacks using techniques such as fuzzing and input validation, and sanitizationmanage windows file system permissionsdifferentiate between mandatory, discretionary, role-based, and attribute-based access controldifferentiate between authentication and authorizationidentify active network hosts and services using nmap
-
plan for various types of security testingdigitally sign a microsoft powershell scriptlist methods by which malicious actors can gain access to sensitive dataidentify how extensible markup language (xml) is used to describe datarecall methods by which sensitive data exposure attacks can be mitigatedrecognize types of injection attacksenable ipsec to protect lan trafficuse wireshark to view plain text credential transmissionsrecognize how to mitigate broken authentication attacksnavigate through web server subdirectories through a web applicationhash user credentialsdescribe the purpose of the open web application security project (owasp)crack rdp passwords using hydradescribe the pki hierarchyuse freely available tools to run a sql injection attack against a web applicationlist common data privacy standardsuse the hydra tool to crack web form user passwordsidentify methods by which sensitive data exposure attacks can be mitigatedharden user authentication settings using microsoft group policyrecognize how to securely write codedescribe how security misconfigurations can be mitigateddescribe how to mitigate xxe attacksrecognize how weak authentication configurations can lead to system compromisedeploy a web application firewall solution in the microsoft azure cloudidentify how broken access control attacks occuridentify components related to developing and running a web applicationprovide examples of security misconfigurationsmanage linux file system permissionsdifferentiate between static and dynamic software testinghash files using linux commands
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.