YoVDO

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Access Control Courses Web Application Security Courses System Hardening Courses OWASP Top 10 Courses Broken Access Control Courses

Course Description

Overview

Learn about security misconfiguration and vulnerable and outdated components, the fifth and sixth most important security vulnerabilities listed on the 2021 OWASP Top 10.

Syllabus

Introduction
  • 2021 OWASP Top 10
  • OWASP Top 10 series
1. Security Misconfiguration
  • What is security misconfiguration?
  • Example #1: 2020 SolarWinds data breach
  • Example #2: State of Pentesting Report
  • Prevention technique #1: Repeatable hardening
  • Prevention technique #2: Minimal platform
  • Prevention technique #3: Configuration review
2. Insecure Design
  • What are vulnerable and outdated components?
  • Real-world example #1: Equifax breach 2017
  • Real-world example #2: Target breach 2013
  • Prevention technique #1: Remove unnecessary features
  • Prevention technique #2: Continuous inventory management
  • Prevention technique #3: Leverage virtual patching
Conclusion
  • Explore more of the OWASP Top 10

Taught by

Caroline Wong

Related Courses

Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera
Computing, Storage and Security with Google Cloud Platform
Google via Coursera