YoVDO

OWASP Top 10: Injection Attacks

Offered By: Codecademy

Tags

Cybersecurity Courses SQL Injection Courses Web Application Security Courses Injection Attacks Courses OWASP Top 10 Courses

Course Description

Overview

You will learn about some critical injection attacks; shell injection attacks, email header injection attacks, and SQL injection attacks.


OWASP Top 10: Injection Attacks covers the 2021 OWASP Top 10 Web Application Security Risks, injection attacks. In the 2017 OWASP Top 10, injection was in 1st place and has moved down to 3rd place in the 2021 OWASP Top 10. This course will explore the different types of injection attacks, shell injection, email header, and SQL injection. You will learn how to identify them and prevent them from your system.


* Identify and prevent email header injection.

* Identify and prevent shell injection.

* Identify and prevent SQL injection.






Syllabus

  • Don't Mean To Inject But Here Comes Shell Injection Attacks: With an injection attack, the hacker injects malicious code into the system to launch unauthorized commands that request sensitive data.

    • Article: The World of Shell Injection Attacks
    • Lesson: Identify and Prevent Shell Injection Attacks
    • Quiz: Don't Mean To Inject But Here Comes Shell Injection Attacks
  • Don't Mean To Inject, But Here Comes Email Header Injection Attacks: With an injection attack, the hacker injects malicious code into the system to launch unauthorized commands that request sensitive data.
    • Article: The World of Email Header Injection Attacks
    • Lesson: Identify and Prevent Email Header Injection Attack
    • Quiz: Don't Mean To Inject But, Here Comes Email Header Injection Attacks Quiz
  • Don't Mean To Inject But Here Comes SQL Injection Attacks: With an injection attack, the hacker injects malicious code into the system to launch unauthorized commands that request sensitive data.

    • Article: SQL Injection
    • Lesson: Preventing SQL Injection Attacks
    • Quiz: Preventing SQL Injections
    • Project: Codey's Confectionery: Preventing SQL Injection Attacks
    • Informational: OWASP Top 10 Survey
  • OWASP Top 10: Injection Attacks Next Steps: After completing this course, let's learn what next steps you can take to strengthen your cybersecurity knowledge.
    • Informational: OWASP Top 10: Injection Attacks Next Steps
    • Informational: OWASP Top 10 - Coming Soon

Taught by

Jace van Auken

Related Courses

Introduction to OWASP Top 10 Security Risks
A Cloud Guru
AWS SimuLearn: Cyber Security Threats
Amazon Web Services via AWS Skill Builder
AWS SimuLearn: Edge Protection
Amazon Web Services via AWS Skill Builder
Cloud Security Scanner: Qwik Start
Google via Google Cloud Skills Boost
OWASP Top 10: Broken Access Control
Codecademy