The Open Web Application Security Project (OWASP) was formed to provide the public with the resources to understand and improve software security. The OWASP Top 10 list describes the ten biggest software vulnerabilities. In this course, application security expert Caroline Wong provides an overview of the top two: injection and broken authentication attacks. Find out how injection and broken authentication work and see real-life examples of the attacks and their impact on companies and consumers. Plus, get prevention techniques to avoid putting your applications and users at risk.
Table of Contents
Introduction
1 Welcome
1 Welcome
Injection Attacks – How Do They Work
2 General concept
2 General concept
Impact of Injection Attacks
3 Example scenario one
4 Example scenario two
3 Example scenario one
4 Example scenario two
Preventing Injection Attacks
5 Input validation
6 Prepared statements and stored procedures
7 Least privilege
5 Input validation
6 Prepared statements and stored procedures
7 Least privilege
Broken Authentication Attacks – How Do They Work
8 General concept
9 Variations on the general concept
8 General concept
9 Variations on the general concept
Impact of Broken Authentication Attacks
10 Example scenario one
11 Example scenario two
10 Example scenario one
11 Example scenario two
Preventing Broken Authentication Attacks
12 Use complex passwords
13 Store passwords with proper encryption
14 Use multi-factor authentication
12 Use complex passwords
13 Store passwords with proper encryption
14 Use multi-factor authentication
Conclusion
15 Conclusion WO
15 Conclusion WO
OWASP Top 10: #1 Injection and #2 Broken Authentication
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 0h 37m | 170 MB
English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 0h 37m | 170 MB
Download from Turbobit
Download from DepositFiles
Download from Rapidgator
No comments: