Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

via LinkedIn Learning

Overview

Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.

Syllabus

Introduction
  • Prevent common security vulnerabilities
1. Broken Access Control: How Does It Work?
  • General concept
2. Impact of Broken Access Control
  • Example scenario 1
  • Example scenario 2
3. Preventing Broken Access Control
  • Properly implement access controls
  • Logging and alerting
  • Manual testing
4. Security Misconfiguration: How Does It Work?
  • General concept
5. Impact of Security Misconfiguration
  • Example scenario 1
  • Example scenario 2
6. Preventing Security Misconfiguration
  • Harden all systems
  • Patch and update software
  • Test configurations
Conclusion
  • Next steps

Taught by

Caroline Wong

Reviews

4.8 rating at LinkedIn Learning based on 93 ratings

Start your review of OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.