OWASP Top 10: Injection Attacks
Offered By: Codecademy
Course Description
Overview
You will learn about some critical injection attacks; shell injection attacks, email header injection attacks, and SQL injection attacks.
OWASP Top 10: Injection Attacks covers the 2021 OWASP Top 10 Web Application Security Risks, injection attacks. In the 2017 OWASP Top 10, injection was in 1st place and has moved down to 3rd place in the 2021 OWASP Top 10. This course will explore the different types of injection attacks, shell injection, email header, and SQL injection. You will learn how to identify them and prevent them from your system.
* Identify and prevent email header injection.
* Identify and prevent shell injection.
* Identify and prevent SQL injection.
OWASP Top 10: Injection Attacks covers the 2021 OWASP Top 10 Web Application Security Risks, injection attacks. In the 2017 OWASP Top 10, injection was in 1st place and has moved down to 3rd place in the 2021 OWASP Top 10. This course will explore the different types of injection attacks, shell injection, email header, and SQL injection. You will learn how to identify them and prevent them from your system.
* Identify and prevent email header injection.
* Identify and prevent shell injection.
* Identify and prevent SQL injection.
Syllabus
- Don't Mean To Inject But Here Comes Shell Injection Attacks: With an injection attack, the hacker injects malicious code into the system to launch unauthorized commands that request sensitive data.
- Article: The World of Shell Injection Attacks
- Lesson: Identify and Prevent Shell Injection Attacks
- Quiz: Don't Mean To Inject But Here Comes Shell Injection Attacks
- Don't Mean To Inject, But Here Comes Email Header Injection Attacks: With an injection attack, the hacker injects malicious code into the system to launch unauthorized commands that request sensitive data.
- Article: The World of Email Header Injection Attacks
- Lesson: Identify and Prevent Email Header Injection Attack
- Quiz: Don't Mean To Inject But, Here Comes Email Header Injection Attacks Quiz
- Don't Mean To Inject But Here Comes SQL Injection Attacks: With an injection attack, the hacker injects malicious code into the system to launch unauthorized commands that request sensitive data.
- Article: SQL Injection
- Lesson: Preventing SQL Injection Attacks
- Quiz: Preventing SQL Injections
- Project: Codey's Confectionery: Preventing SQL Injection Attacks
- Informational: OWASP Top 10 Survey
- OWASP Top 10: Injection Attacks Next Steps: After completing this course, let's learn what next steps you can take to strengthen your cybersecurity knowledge.
- Informational: OWASP Top 10: Injection Attacks Next Steps
- Informational: OWASP Top 10 - Coming Soon
Taught by
Jace van Auken
Related Courses
Introduction to OWASP Top 10 Security RisksA Cloud Guru AWS SimuLearn: Cyber Security Threats
Amazon Web Services via AWS Skill Builder AWS SimuLearn: Edge Protection
Amazon Web Services via AWS Skill Builder Cloud Security Scanner: Qwik Start
Google via Google Cloud Skills Boost OWASP Top 10: Broken Access Control
Codecademy