Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.
OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
Description
Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.
Tags
Syllabus
Introduction
- Prevent common security vulnerabilities
- General concept
- Example scenario 1
- Example scenario 2
- Properly implement access controls
- Logging and alerting
- Manual testing
- General concept
- Example scenario 1
- Example scenario 2
- Harden all systems
- Patch and update software
- Test configurations
- Next steps
Related Courses
OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
Affiliate notice
-
TypeOnline Course
-
Provider
Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.
Introduction
- Prevent common security vulnerabilities
- General concept
- Example scenario 1
- Example scenario 2
- Properly implement access controls
- Logging and alerting
- Manual testing
- General concept
- Example scenario 1
- Example scenario 2
- Harden all systems
- Patch and update software
- Test configurations
- Next steps
Tags
Loading...
Saving...
Loading...