Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

OWASP Top 10: #7 XSS and #8 Insecure Deserialization

via LinkedIn Learning

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Prepare for the seventh and eighth most common vulnerabilities on the 2021 OWASP Top 10 List: identity and authentication failures, and software and data integrity failures.

Syllabus

Introduction
  • OWASP Top 10
  • OWASP Top 10 series
1. Identification and Authentication Failures
  • What are identification and authentication failures?
  • Example 1: Pwned Passwords
  • Example 2: 2021 Verkada data breach
  • Prevention technique: Check for weak passwords
  • Prevention technique: Use multi-factor authentication
  • Prevention technique: Log and limit repeated login attempts
2. Software and Data Integrity Failures
  • What are software and data integrity failures?
  • Example 1: Solar Winds software supply chain attack
  • Example 2: 2021 Codecov bash uploader compromise
  • Prevention technique: Use digital signatures
  • Prevention technique: Ensure repositories are trustworthy
  • Prevention technique: Review code and configuration changes
Conclusion
  • OWASP Top 10 keep learning

Taught by

Caroline Wong

Reviews

4.7 rating at LinkedIn Learning based on 77 ratings

Start your review of OWASP Top 10: #7 XSS and #8 Insecure Deserialization

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.