OWASP: Top 10 Items A3, A2, & A1

OWASP    |    Intermediate
  • 12 videos | 42m 26s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 121 users Rating 4.5 of 121 users (121)
In this 12-video course, learners will discover security aspects focusing on OWASP Top 10 2017 Item A3: Sensitive Data Exposure, Item A2: Broken Authentication and Item A1: Injection. Key concepts covered in this course include details about OWASP Top 10 2017 Item A3, sensitive data exposure, and how data are transmitted over networks; how to prevent sensitive data disclosure through mitigating and protecting; and how to enable BitLocker encryption for a web server disk volume. Next, learn details about OWASP Top 10 2017 Item A2, broken authentication, and learn how to secure authentication; observe how to enable multifactor authentication (MFA) for an Amazon Web Services user account; and learn how to retrieve sensitive data through password reset pages. Finally, learn details about OWASP Top 10 2017 Item A1, injection - how attackers feed malicious input to a web application; and how to validate user input before allowing submission for execution. The concluding exercise deals with how authentication can be hardened, how to list mitigations against SQL injection attacks, and how MFA enhances security.

WHAT YOU WILL LEARN

  • Discover the subject areas covered in this course
    Describe owasp top 10 2017 item a3, sensitive data exposure
    Recognize how to prevent sensitive data disclosure
    Enable bitlocker encryption for a web server disk volume
    Describe owasp top 10 2017 item a2, broken authentication
    Recognize how to secure authentication
  • Enable mfa for an amazon web services user account
    Retrieve sensitive data through password reset pages
    Describe owasp top 10 2017 item a1, injection
    Recognize how to validate user input before allowing submission for execution
    Inject sql commands into a web form field
    Encrypt data at rest, secure authentication and prevent injection attacks

IN THIS COURSE

  • 1m 57s
  • 4m 37s
    Upon completion of this video, you will be able to describe OWASP Top 10 2017 item A3, which is sensitive data exposure. FREE ACCESS
  • Locked
    3.  Mitigating Sensitive Data Exposure
    3m 44s
    Upon completion of this video, you will be able to recognize how to prevent the disclosure of sensitive data. FREE ACCESS
  • Locked
    4.  Protecting Sensitive Data at Rest
    4m 36s
    In this video, you will learn how to enable BitLocker encryption for a web server disk volume. FREE ACCESS
  • Locked
    5.  A2 - Broken Authentication
    2m 51s
    Upon completion of this video, you will be able to describe OWASP Top 10 2017 item A2, broken authentication and session management. FREE ACCESS
  • Locked
    6.  Mitigating Broken Authentication
    3m 12s
    After completing this video, you will be able to recognize how to secure authentication. FREE ACCESS
  • Locked
    7.  Multi-factor Authentication
    4m 5s
    In this video, you will learn how to enable multi-factor authentication for an Amazon Web Services user account. FREE ACCESS
  • Locked
    8.  Exploiting Password Reset Pages
    2m 45s
    During this video, you will learn how to retrieve sensitive data through password reset pages. FREE ACCESS
  • Locked
    9.  A1 - Injection
    4m 5s
    After completing this video, you will be able to describe OWASP Top 10 2017 item A1, injection. FREE ACCESS
  • Locked
    10.  Mitigating Injections
    2m 19s
    After completing this video, you will be able to recognize how to validate user input before allowing submission. FREE ACCESS
  • Locked
    11.  Executing a SQL Injection Attack
    3m 25s
    During this video, you will learn how to inject SQL commands into a web form field. FREE ACCESS
  • Locked
    12.  Exercise: Protect Sensitive Data
    4m 51s
    In this video, you will learn how to encrypt data at rest, how to secure authentication, and how to prevent injection attacks. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 344 users Rating 4.6 of 344 users (344)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.9 of 14 users Rating 4.9 of 14 users (14)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 92 users Rating 4.6 of 92 users (92)
Rating 4.7 of 84 users Rating 4.7 of 84 users (84)
Rating 4.5 of 439 users Rating 4.5 of 439 users (439)