OWASP Top 10: #1 Injection and #2 Broken Authentication

Go to class
Write Review

Free Online Course: OWASP Top 10: #1 Injection and #2 Broken Authentication provided by LinkedIn Learning is a comprehensive online course, which lasts for Less than 1 hour of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. OWASP Top 10: #1 Injection and #2 Broken Authentication is taught by Caroline Wong.

Overview
  • Get an overview of the top two software vulnerabilities—injection and broken authentication attacks—described in the OWASP Top 10.

Syllabus
  • Introduction

    • Welcome
    1. Injection Attacks: How Do They Work?
    • General concept
    2. Impact of Injection Attacks
    • Example scenario one
    • Example scenario two
    3. Preventing Injection Attacks
    • Input validation
    • Prepared statements and stored procedures
    • Least privilege
    4. Broken Authentication Attacks: How Do They Work?
    • General concept
    • Variations on the general concept
    5. Impact of Broken Authentication Attacks
    • Example scenario one
    • Example scenario two
    6. Preventing Broken Authentication Attacks
    • Use complex passwords
    • Store passwords with proper encryption
    • Use multi-factor authentication
    Conclusion
    • Next steps