OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
Offered By: LinkedIn Learning
Course Description
Overview
Learn about security misconfiguration and vulnerable and outdated components, the fifth and sixth most important security vulnerabilities listed on the 2021 OWASP Top 10.
Syllabus
Introduction
- 2021 OWASP Top 10
- OWASP Top 10 series
- What is security misconfiguration?
- Example #1: 2020 SolarWinds data breach
- Example #2: State of Pentesting Report
- Prevention technique #1: Repeatable hardening
- Prevention technique #2: Minimal platform
- Prevention technique #3: Configuration review
- What are vulnerable and outdated components?
- Real-world example #1: Equifax breach 2017
- Real-world example #2: Target breach 2013
- Prevention technique #1: Remove unnecessary features
- Prevention technique #2: Continuous inventory management
- Prevention technique #3: Leverage virtual patching
- Explore more of the OWASP Top 10
Taught by
Caroline Wong
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network