IT Professional Curricula      Internet and Network Technologies Solution Area      Security Solutions      OWASP Top 10                            
                        
                    
                    
                        OWASP Top 10 list items 5 and 1 cover security misconfigurations and injection, two highly common attacks in modern web applications                        
                    
                    
                                            
                            
                            
                                
                                    | Objectives | 
                                
                                    | OWASP A5 and A1: Security and Injection start the courseexplain what Security Misconfigurations arehow Security Misconfigurations can be exploited and what kind of access is needed to exploit ithow easy it is to detect Security Misconfigurations and how common they arethe technical and business impacts of Security Misconfigurationsprovide examples of Security Misconfiguration attacksenable protection for a web app through a WAFexplain what Injection ishow Injection can be exploited and what kind of access is needed to exploit ithow easy it is to detect Injection and how common they arethe technical and business impacts of Injection attacksprovide examples of Injection attacksinject SQL commands into a web form field
Practice: A5 and A1 Commonality explain how A5 and A1 can be exploited by attackers
 |