Final Exam: OWASP Top 10 Mitigations

  • 1 video | 32s
  • Includes Assessment
  • Earns a Badge
Likes 5 Likes 5
Final Exam: OWASP Top 10 Mitigations will test your knowledge and application of the topics presented throughout the Skillsoft Aspire Web App Vulnerability Analyst Journey.


  • differentiate between SIEM and SOAR monitoring and incident response solutions
    manage Docker containers on a Linux computer
    describe how the concept of objects, methods, and properties applies to scripting and software development
    configure and test Snort IDS rules
    recognize how security must be integrated into all aspects of Continuous Integration and Continuous Delivery (CI/CD)
    install the Snort IDS
    deploy security controls to mitigate XSS attacks
    install and configure Windows Server Update Services (WSUS)
    describe how Java and JavaScript are used in web applications
    configure syslog-ng in Linux to forward log entries to a central logging host
    deploy security controls to correct monitoring deficiencies
    recognize how Cross-site Scripting (XSS) attacks occur
    apply security settings to users and computers using Microsoft Group Policy
    recognize how to deploy security controls to mitigate deserialization attacks
    describe how intrusion detection and prevention can be deployed and used
    describe how application containers work
    search vulnerable devices on the website
    browse vulnerable devices on the website
    encrypt user credentials
    describe how a web application firewall differs from other types of firewalls
    hash files using Windows commands
    identify how HTTP requests and responses interact with web applications
    apply security controls to mitigate broken access control attacks
    list various ways that XML attacks can be executed
    describe what Personally Identifiable Information (PII) is and how it relates to data classification and security
    mitigate injection attacks using techniques such as fuzzing and input validation, and sanitization
    manage Windows file system permissions
    differentiate between mandatory, discretionary, role-based, and attribute-based access control
    differentiate between authentication and authorization
    identify active network hosts and services using nmap
  • plan for various types of security testing
    digitally sign a Microsoft PowerShell script
    list methods by which malicious actors can gain access to sensitive data
    identify how Extensible Markup Language (XML) is used to describe data
    recall methods by which sensitive data exposure attacks can be mitigated
    recognize types of injection attacks
    enable IPsec to protect LAN traffic
    use Wireshark to view plain text credential transmissions
    recognize how to mitigate broken authentication attacks
    navigate through web server subdirectories through a web application
    hash user credentials
    describe the purpose of the Open Web Application Security Project (OWASP)
    crack RDP passwords using Hydra
    describe the PKI hierarchy
    use freely available tools to run a SQL injection attack against a web application
    list common data privacy standards
    use the Hydra tool to crack web form user passwords
    identify methods by which sensitive data exposure attacks can be mitigated
    harden user authentication settings using Microsoft Group Policy
    recognize how to securely write code
    describe how security misconfigurations can be mitigated
    describe how to mitigate XXE attacks
    recognize how weak authentication configurations can lead to system compromise
    deploy a web application firewall solution in the Microsoft Azure cloud
    identify how broken access control attacks occur
    identify components related to developing and running a web application
    provide examples of security misconfigurations
    manage Linux file system permissions
    differentiate between static and dynamic software testing
    hash files using Linux commands



Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.


Likes 8 Likes 8  
Likes 12 Likes 12  
Likes 2 Likes 2  


Likes 21 Likes 21  
Likes 61 Likes 61  
Likes 440 Likes 440