->
Lynda - OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration - 806159
Lynda - OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
Security-related incidents pose major threats to organizations of all sizes, as well as the customers they serve. The Open Web Application Security Project (OWASP) was formed to educate the public about some of the most common security vulnerabilities. OWASP also provides a list—the OWASP top ten—that highlights the most critical security risks out there. In this course, Caroline Wong explores broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10. Caroline explains how these threats work and provides real-life examples of how they can impact companies and consumers. Plus, she provides techniques that can help you prevent broken access control and security misconfiguration from impacting your organization.


Table of Contents

  • Introduction
  • 1. Broken Access Control: How Does It Work?
  • 2. Impact of Broken Access Control
  • 3. Preventing Broken Access Control
  • 4. Security Misconfiguration: How Does It Work?
  • 5. Impact of Security Misconfiguration
  • 6. Preventing Security Misconfiguration
  • Conclusion
  • Lynda - OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration


     TO MAC USERS: If RAR password doesn't work, use this archive program: 

    RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


     TO WIN USERS: If RAR password doesn't work, use this archive program: 

    Latest Winrar  and extract password protected files without error.


     Coktum   |  

    Information
    Members of Guests cannot leave comments.




    rss