A5 and A1: Security and Injection

OWASP    |    Intermediate
  • 13 videos | 1h 8m 42s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 334 users Rating 4.6 of 334 users (334)
OWASP Top 10 list items 5 and 1 cover security misconfigurations and injection, two highly common attacks in modern web applications

WHAT YOU WILL LEARN

  • Explain what security misconfigurations are
    How security misconfigurations can be exploited and what kind of access is needed to exploit it
    How easy it is to detect security misconfigurations and how common they are
    The technical and business impacts of security misconfigurations
    Provide examples of security misconfiguration attacks
    Enable protection for a web app through a waf
    Explain what injection is
  • How injection can be exploited and what kind of access is needed to exploit it
    How easy it is to detect injection and how common they are
    The technical and business impacts of injection attacks
    Provide examples of injection attacks
    Inject sql commands into a web form field
    Explain how a5 and a1 can be exploited by attackers

IN THIS COURSE

  • 7m 30s
    After completing this video, you will be able to explain what Security Misconfigurations are. FREE ACCESS
  • 6m 21s
    During this video, you will learn how Security Misconfigurations can be exploited and what kind of access is needed to exploit them. FREE ACCESS
  • Locked
    3.  A5 - Security Misconfiguration Detection
    7m 8s
    In this video, you will learn how easy it is to detect Security Misconfigurations and how common they are. FREE ACCESS
  • Locked
    4.  A5 - Security Misconfiguration Impacts
    6m 8s
    Learn how to mitigate the technical and business impacts of Security Misconfigurations. FREE ACCESS
  • Locked
    5.  A5 - Security Misconfiguration Attacks
    7m 17s
    After completing this video, you will be able to provide examples of Security Misconfiguration attacks. FREE ACCESS
  • Locked
    6.  A5 - Configure a Web Application Firewall
    3m 53s
    During this video, you will learn how to enable protection for a web app through a web application firewall. FREE ACCESS
  • Locked
    7.  A1 - Injection
    4m 26s
    After completing this video, you will be able to explain what Injection is. FREE ACCESS
  • Locked
    8.  A1 - Injection Exploits
    5m 8s
    During this video, you will learn how Injection can be exploited and what kind of access is needed to exploit it. FREE ACCESS
  • Locked
    9.  A1 - Injection Detection
    4m 17s
    In this video, learn how easy it is to detect Injection and how common they are. FREE ACCESS
  • Locked
    10.  A1 - Injection Impacts
    3m 49s
    Find out how to mitigate the technical and business impacts of Injection attacks. FREE ACCESS
  • Locked
    11.  A1 - Injection Attacks
    5m 57s
    After completing this video, you will be able to provide examples of Injection attacks. FREE ACCESS
  • Locked
    12.  A1 - Execute a SQL Injection Attack
    3m 18s
    Learn how to inject SQL commands into a web form field. FREE ACCESS
  • Locked
    13.  Exercise: How can A5 and A1 be exploited
    3m 31s
    After completing this video, you will be able to explain how A5 and A1 can be exploited by attackers. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.0 of 1 users Rating 4.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 336 users Rating 4.6 of 336 users (336)
Rating 4.6 of 147 users Rating 4.6 of 147 users (147)
Rating 4.5 of 354 users Rating 4.5 of 354 users (354)