OWASP Top 10: #1 Injection and #2 Broken Authentication
Offered By: LinkedIn Learning
Course Description
Overview
Learn about broken access control and cryptographic failures, the first two security vulnerabilities listed on the 2021 OWASP Top 10.
Syllabus
Introduction
- OWASP Top 10
- What is broken access control?
- Example 1: 2021 Facebook broken access control vulnerability
- Example 2: 2021 personal data travel breach
- Prevention techniques: Least privilege
- Prevention techniques: Record ownership and logging
- Prevention techniques: Functional access control testing
- What is cryptographic failure?
- Example 1: 2021 GoDaddy plaintext passwords
- Example 2: Using a broken or risky cryptographic algorithm
- Prevention techniques: Data classification
- Prevention techniques: Proper key management
- Prevention techniques: Secure protocols
- OWASP Top 10 keep learning
Taught by
Caroline Wong
Related Courses
Big Data - Capstone ProjectUniversity of California, San Diego via Coursera ChatGPT for Beginners: Save time with Microsoft Excel
Coursera Project Network via Coursera Asset Security
Packt via Coursera Dark Data Basics - Understanding the Unknown
Arizona State University via Coursera Introduction to Data Privacy
DataCamp