OWASP Top 10: A5 - Broken Access Control

OWASP    |    Intermediate
  • 14 videos | 1h 31m 4s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 58 users Rating 4.4 of 58 users (58)
Resource authorization occurs after successful authentication. Resources include objects such as files, folders, web apps, storage accounts, virtual machines, and so on. In this course, you'll learn about various resource access control models including MAC, DAC, and RBAC. Next, you'll examine how broken access control attacks occur. You'll then explore HTTP methods, as well as how to set file system permissions in Windows and Linux, assign permissions to code, and digitally sign a PowerShell script. Lastly, you'll learn about identify federation, how to execute broken access control attacks, and how to mitigate broken access control attacks.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Differentiate between mandatory, discretionary, role-based, and attribute-based access control
    Identify how broken access control attacks occur
    Identify how http requests and responses interact with web applications
    Manage windows file system permissions
    Manage linux file system permissions
    Configure attribute-based file system permissions in windows
  • Configure permissions for microsoft azure managed identities
    Digitally sign a microsoft powershell script
    Recognize the role of identity and resource providers in a federated identity environment
    Navigate through web server subdirectories through a web application
    Capture user keystrokes using a hardware keylogger
    Apply security controls to mitigate broken access control attacks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 42s
  • 7m 46s
  • Locked
    3.  Broken Access Control Attacks
    6m 48s
  • Locked
    4.  HTTP Methods
    6m 4s
  • Locked
    5.  Managing Windows File System Permissions
    6m 41s
  • Locked
    6.  Managing Linux File System Permissions
    8m
  • Locked
    7.  Managing Attribute-based File System Permissions
    11m 19s
  • Locked
    8.  Assigning Code Permissions in the Cloud
    7m 9s
  • Locked
    9.  Digitally Signing PowerShell Scripts
    7m 7s
  • Locked
    10.  Identity Federation and Claims
    7m 8s
  • Locked
    11.  Executing a Directory Traversal Attack
    8m 2s
  • Locked
    12.  Acquiring Keystrokes Using a Hardware Keylogger
    5m 23s
  • Locked
    13.  Mitigating Broken Access Control Attacks
    6m 47s
  • Locked
    14.  Course Summary
    1m 10s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 24 users Rating 4.7 of 24 users (24)
Rating 4.6 of 396 users Rating 4.6 of 396 users (396)
Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.5 of 778 users Rating 4.5 of 778 users (778)
Rating 4.6 of 59 users Rating 4.6 of 59 users (59)