Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

via LinkedIn Learning

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about security misconfiguration and vulnerable and outdated components, the fifth and sixth most important security vulnerabilities listed on the 2021 OWASP Top 10.

Syllabus

Introduction
  • 2021 OWASP Top 10
  • OWASP Top 10 series
1. Security Misconfiguration
  • What is security misconfiguration?
  • Example #1: 2020 SolarWinds data breach
  • Example #2: State of Pentesting Report
  • Prevention technique #1: Repeatable hardening
  • Prevention technique #2: Minimal platform
  • Prevention technique #3: Configuration review
2. Insecure Design
  • What are vulnerable and outdated components?
  • Real-world example #1: Equifax breach 2017
  • Real-world example #2: Target breach 2013
  • Prevention technique #1: Remove unnecessary features
  • Prevention technique #2: Continuous inventory management
  • Prevention technique #3: Leverage virtual patching
Conclusion
  • Explore more of the OWASP Top 10

Taught by

Caroline Wong

Reviews

4.7 rating at LinkedIn Learning based on 136 ratings

Start your review of OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.