Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

OWASP Top 10: #1 Injection and #2 Broken Authentication

via LinkedIn Learning

Overview

Learn about broken access control and cryptographic failures, the first two security vulnerabilities listed on the 2021 OWASP Top 10.

Syllabus

Introduction
  • OWASP Top 10
1. Broken Access Control
  • What is broken access control?
  • Example 1: 2021 Facebook broken access control vulnerability
  • Example 2: 2021 personal data travel breach
  • Prevention techniques: Least privilege
  • Prevention techniques: Record ownership and logging
  • Prevention techniques: Functional access control testing
2. Cryptographic Failure
  • What is cryptographic failure?
  • Example 1: 2021 GoDaddy plaintext passwords
  • Example 2: Using a broken or risky cryptographic algorithm
  • Prevention techniques: Data classification
  • Prevention techniques: Proper key management
  • Prevention techniques: Secure protocols
Conclusion
  • OWASP Top 10 keep learning

Taught by

Caroline Wong

Reviews

4.7 rating at LinkedIn Learning based on 248 ratings

Start your review of OWASP Top 10: #1 Injection and #2 Broken Authentication

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.