OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures
Offered By: LinkedIn Learning
Course Description
Overview
Learn about broken access control and cryptographic failures, the first two security vulnerabilities listed on the 2021 OWASP Top 10.
Syllabus
Introduction
- OWASP Top 10
- What is broken access control?
- Example 1: 2021 Facebook broken access control vulnerability
- Example 2: 2021 personal data travel breach
- Prevention techniques: Least privilege
- Prevention techniques: Record ownership and logging
- Prevention techniques: Functional access control testing
- What is cryptographic failure?
- Example 1: 2021 GoDaddy plaintext passwords
- Example 2: Using a broken or risky cryptographic algorithm
- Prevention techniques: Data classification
- Prevention techniques: Proper key management
- Prevention techniques: Secure protocols
- OWASP Top 10 keep learning
Taught by
Caroline Wong
Related Courses
Asymmetric Cryptography and Key ManagementUniversity of Colorado System via Coursera Introduction to Applied Cryptography
University of Colorado System via Coursera Applied Cryptography
University of Colorado System via Coursera Designing for Advanced Security within AWS
Pluralsight Creating Security Baselines in Microsoft Azure
Pluralsight