OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Go to class
Write Review

Free Online Course: OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration provided by LinkedIn Learning is a comprehensive online course, which lasts for Less than 1 hour of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration is taught by Caroline Wong.

Overview
  • Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.

Syllabus
  • Introduction

    • Prevent common security vulnerabilities
    1. Broken Access Control: How Does It Work?
    • General concept
    2. Impact of Broken Access Control
    • Example scenario 1
    • Example scenario 2
    3. Preventing Broken Access Control
    • Properly implement access controls
    • Logging and alerting
    • Manual testing
    4. Security Misconfiguration: How Does It Work?
    • General concept
    5. Impact of Security Misconfiguration
    • Example scenario 1
    • Example scenario 2
    6. Preventing Security Misconfiguration
    • Harden all systems
    • Patch and update software
    • Test configurations
    Conclusion
    • Next steps