Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

via LinkedIn Learning

Write review

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about security misconfiguration and vulnerable and outdated components, the fifth and sixth most important security vulnerabilities listed on the 2021 OWASP Top 10.

Syllabus

Introduction
  • 2021 OWASP Top 10
  • OWASP Top 10 series
1. Security Misconfiguration
  • What is security misconfiguration?
  • Example #1: 2020 SolarWinds data breach
  • Example #2: State of Pentesting Report
  • Prevention technique #1: Repeatable hardening
  • Prevention technique #2: Minimal platform
  • Prevention technique #3: Configuration review
2. Insecure Design
  • What are vulnerable and outdated components?
  • Real-world example #1: Equifax breach 2017
  • Real-world example #2: Target breach 2013
  • Prevention technique #1: Remove unnecessary features
  • Prevention technique #2: Continuous inventory management
  • Prevention technique #3: Leverage virtual patching
Conclusion
  • Explore more of the OWASP Top 10

Taught by

Caroline Wong

Reviews

4.7 rating at LinkedIn Learning based on 136 ratings

Start your review of OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.