Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.
Overview
Syllabus
Introduction
- Prevent common security vulnerabilities
- General concept
- Example scenario 1
- Example scenario 2
- Properly implement access controls
- Logging and alerting
- Manual testing
- General concept
- Example scenario 1
- Example scenario 2
- Harden all systems
- Patch and update software
- Test configurations
- Next steps
Taught by
Caroline Wong