A7 and A6: Leaky and Unprepared Applications
OWASP
| Intermediate
- 18 videos | 1h 1m 7s
- Includes Assessment
- Earns a Badge
OWASP Top 10 list items 7 and 6 involve applications that expose sensitive data and are not protected from modern attacks.
WHAT YOU WILL LEARN
-
Describe what insufficient attack protection isExploit insufficient attack protection and what kind of access is needed to exploit itUse nmap to scan a networkDetect insufficient attack protection and note how common it isUse online web app scannersDescribe the client/server http exchangeAnalyze linux log rotation files for a linux web serverList the technical and business impacts of insufficient attack protectionDiscuss attacks that take advantage of insufficient attack protection
-
Describe what sensitive data exposure isAnalyze sensitive network traffic in linuxDescribe how sensitive data exposure can be exploitedReview how sensitive data exposure can be exploited and what kind of access is needed to exploit itDescribe how easy it is to detect sensitive data exposure and how common it isList the technical and business impacts of sensitive data exposureDescribe how various attacks can result in sensitive data exposureProvide examples of sensitive data exposure attacksDescribe the impact of these exploits on the business and technical sides
IN THIS COURSE
-
6m 33s
-
3m 31s
-
3m 11s
-
5m 50s
-
2m 19s
-
3m 56s
-
2m 12s
-
4m 32s
-
4m 12s
-
4m 15s
-
1m 26s
-
3m 12s
-
3m 28s
-
2m
-
1m 27s
-
3m 40s
-
2m 33s
-
2m 51s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.