Launch a New Career with Certificates from Google, IBM & Microsoft
Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Prepare for the seventh and eighth most common vulnerabilities on the 2021 OWASP Top 10 List: identity and authentication failures, and software and data integrity failures.
Syllabus
Introduction
- OWASP Top 10
- OWASP Top 10 series
- What are identification and authentication failures?
- Example 1: Pwned Passwords
- Example 2: 2021 Verkada data breach
- Prevention technique: Check for weak passwords
- Prevention technique: Use multi-factor authentication
- Prevention technique: Log and limit repeated login attempts
- What are software and data integrity failures?
- Example 1: Solar Winds software supply chain attack
- Example 2: 2021 Codecov bash uploader compromise
- Prevention technique: Use digital signatures
- Prevention technique: Ensure repositories are trustworthy
- Prevention technique: Review code and configuration changes
- OWASP Top 10 keep learning
Taught by
Caroline Wong