->
Lynda - OWASP Top 10: #1 Injection and #2 Broken Authentication - 704143
Lynda - OWASP Top 10: #1 Injection and #2 Broken Authentication
The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand and improve software security. The OWASP Top 10 list describes the ten biggest software vulnerabilities. In this course, application security expert Caroline Wong provides an overview of the top two: injection and broken authentication attacks. Find out how injection and broken authentication work and see real-life examples of the attacks and their impact on companies and consumers. Plus, get prevention techniques to avoid putting your applications and users at risk.


Table of Contents

  • Introduction
  • 1. Injection Attacks: How Do They Work?
  • 2. Impact of Injection Attacks
  • 3. Preventing Injection Attacks
  • 4. Broken Authentication Attacks: How Do They Work?
  • 5. Impact of Broken Authentication Attacks
  • 6. Preventing Broken Authentication Attacks
  • Conclusion
  • Lynda - OWASP Top 10: #1 Injection and #2 Broken Authentication


     TO MAC USERS: If RAR password doesn't work, use this archive program: 

    RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


     TO WIN USERS: If RAR password doesn't work, use this archive program: 

    Latest Winrar  and extract password protected files without error.


     Coktum   |  

    Information
    Members of Guests cannot leave comments.




    rss