YoVDO

OWASP Top 10: Injection Attacks

Offered By: Codecademy

Tags

Cybersecurity Courses SQL Injection Courses Web Application Security Courses Injection Attacks Courses OWASP Top 10 Courses

Course Description

Overview

You will learn about some critical injection attacks; shell injection attacks, email header injection attacks, and SQL injection attacks.


OWASP Top 10: Injection Attacks covers the 2021 OWASP Top 10 Web Application Security Risks, injection attacks. In the 2017 OWASP Top 10, injection was in 1st place and has moved down to 3rd place in the 2021 OWASP Top 10. This course will explore the different types of injection attacks, shell injection, email header, and SQL injection. You will learn how to identify them and prevent them from your system.


* Identify and prevent email header injection.

* Identify and prevent shell injection.

* Identify and prevent SQL injection.






Syllabus

  • Don't Mean To Inject But Here Comes Shell Injection Attacks: With an injection attack, the hacker injects malicious code into the system to launch unauthorized commands that request sensitive data.

    • Article: The World of Shell Injection Attacks
    • Lesson: Identify and Prevent Shell Injection Attacks
    • Quiz: Don't Mean To Inject But Here Comes Shell Injection Attacks
  • Don't Mean To Inject, But Here Comes Email Header Injection Attacks: With an injection attack, the hacker injects malicious code into the system to launch unauthorized commands that request sensitive data.
    • Article: The World of Email Header Injection Attacks
    • Lesson: Identify and Prevent Email Header Injection Attack
    • Quiz: Don't Mean To Inject But, Here Comes Email Header Injection Attacks Quiz
  • Don't Mean To Inject But Here Comes SQL Injection Attacks: With an injection attack, the hacker injects malicious code into the system to launch unauthorized commands that request sensitive data.

    • Article: SQL Injection
    • Lesson: Preventing SQL Injection Attacks
    • Quiz: Preventing SQL Injections
    • Project: Codey's Confectionery: Preventing SQL Injection Attacks
    • Informational: OWASP Top 10 Survey
  • OWASP Top 10: Injection Attacks Next Steps: After completing this course, let's learn what next steps you can take to strengthen your cybersecurity knowledge.
    • Informational: OWASP Top 10: Injection Attacks Next Steps
    • Informational: OWASP Top 10 - Coming Soon

Taught by

Jace van Auken

Related Courses

Hacking and Patching
University of Colorado System via Coursera
Software Design Threats and Mitigations
University of Colorado System via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Identifying Security Vulnerabilities
University of California, Davis via Coursera
Web Application Security Testing with Burp Suite
Coursera Project Network via Coursera