5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Aspire     Web App Vulnerability Analyst     Web App Vulnerability Analyst Track 1: OWASP Top 10 Mitigations
Many web applications accept input from either external data sources or app users. In this course, you'll learn about various types of injection attacks such as SQL and command injections. You will learn how malicious users submit malicious code or commands to a web app for execution by the web server stack. Next, you'll learn how to test a web app for injection vulnerabilities using the OWASP ZAP tool. Next, you’ll set low security for a vulnerable web application tool in order to allow the execution of injection attacks. Next, you'll execute various types of injection attacks against a web application. Lastly, you will learn how to mitigate injection attacks using techniques such as input validation and input sanitization.

Objectives

OWASP Top 10: A1 - Injection

  • discover the key concepts covered in this course
  • recognize types of injection attacks
  • test a web app for injection vulnerabilities using the OWASP Zed Attack Proxy (ZAP) tool
  • use freely available tools to run a SQL injection attack against a web application
  • use freely available tools to run a command injection attack against a web application
  • mitigate injection attacks using techniques such as fuzzing and input validation and sanitization
  • summarize the key concepts covered in this course