Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about security misconfiguration and vulnerable and outdated components, the fifth and sixth most important security vulnerabilities listed on the 2021 OWASP Top 10.
Syllabus
Introduction
- 2021 OWASP Top 10
- OWASP Top 10 series
- What is security misconfiguration?
- Example #1: 2020 SolarWinds data breach
- Example #2: State of Pentesting Report
- Prevention technique #1: Repeatable hardening
- Prevention technique #2: Minimal platform
- Prevention technique #3: Configuration review
- What are vulnerable and outdated components?
- Real-world example #1: Equifax breach 2017
- Real-world example #2: Target breach 2013
- Prevention technique #1: Remove unnecessary features
- Prevention technique #2: Continuous inventory management
- Prevention technique #3: Leverage virtual patching
- Explore more of the OWASP Top 10
Taught by
Caroline Wong