OWASP Top 10: Server Side Request Forgery
Offered By: Codecademy
Course Description
Overview
You will learn about Server-Side Request Forgery, what it is and how to prevent it.
OWASP Top 10: Server Side Request Forgery covers the 2021 OWASP Top 10 Web Application Security Risks, server-side request forgery. In the 2017 OWASP Top 10, server-side request forgery was not in the top 10 vulnerabilities and now was added in 10th place in the 2021 OWASP Top 10. In this course, we will explore what is server-side request forgery and learn how to identify and prevent it from our system.
* Describe what is server-side request forgery.
* Identify server-side request forgery in an application.
* Prevent server-side request forgery in an application.
OWASP Top 10: Server Side Request Forgery covers the 2021 OWASP Top 10 Web Application Security Risks, server-side request forgery. In the 2017 OWASP Top 10, server-side request forgery was not in the top 10 vulnerabilities and now was added in 10th place in the 2021 OWASP Top 10. In this course, we will explore what is server-side request forgery and learn how to identify and prevent it from our system.
* Describe what is server-side request forgery.
* Identify server-side request forgery in an application.
* Prevent server-side request forgery in an application.
Syllabus
- This Is Forgery: Enter the world of server-side request forgery.
- Article: The World of Server-Side Request Forgery
- Lesson: Identify and Prevent Server-Side Request Forgery
- Quiz: This Is Forgery
- OWASP Top 10: Server Side Request Forgery: Next Steps: After completing this course, let's learn what next steps you can take to strengthen your cybersecurity knowledge.
- Informational: Learn About Server-Side Request Forgery Next Steps
- Informational: OWASP Top 10 - Coming Soon
- Informational: OWASP Top 10 Survey
Taught by
Kenny Lin
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network