OWASP Top 10: A07:2021-Identification & Authentication Failures
OWASP
| Intermediate
- 14 videos | 1h 18m 22s
- Includes Assessment
- Earns a Badge
Hardening user and device authentication can go a long way in securing web applications. In this course, learn the difference between authentication and authorization and how they relate to web application security. Next, explore how to hash and encrypt user credentials and harden user accounts through Microsoft Group Policy and practice using freely available tools to crack user credentials in various ways, including the Hydra tool, Burp Suite, and John the Ripper. Finally, learn how to enable user multi-factor authentication and conditional access policies, as well as how to mitigate weak authentication. Upon completion, you'll be able to recognize how to discover and mitigate authentication vulnerabilities using various tools.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDifferentiate between authentication and authorizationRecognize how weak authentication configurations can lead to system compromiseHash user credentialsEncrypt user credentialsAnalyze plain text credential transmissions using wiresharkDeploy password policies to harden user authentication settings using microsoft group policy
-
Crack web form passwords using the hydra toolCrack web form passwords using burp suiteCrack rdp passwords using hydraCrack linux passwords using john the ripperSteal user credentials using the social-engineer toolkit (set)Enable multi-factor authentication for a microsoft azure cloud user accountSummarize the key concepts covered in this course
IN THIS COURSE
-
59s
-
6m 34s
-
5m 48s
-
6m 15s
-
6m 41s
-
6m 24s
-
4m 51s
-
9m 13s
-
4m 42s
-
5m 58s
-
6m 33s
-
5m 59s
-
7m 16s
-
1m 10s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.