der Verbund LEsen Online SUEDbayern - LEO-SUED. OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Seitenbereiche:

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Autor*in: Wong, Caroline

Jahr: 2019

Verfügbar

Inhalt:
Security-related incidents pose major threats to organizations of all sizes, as well as the customers they serve. The Open Web Application Security Project (OWASP) was formed to educate the public about some of the most common security vulnerabilities. OWASP also provides a list-the OWASP top ten-that highlights the most critical security risks out there. In this course, Caroline Wong explores broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10. Caroline explains how these threats work and provides real-life examples of how they can impact companies and consumers. Plus, she provides techniques that can help you prevent broken access control and security misconfiguration from impacting your organization.

Titel: OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Autor*in: Wong, Caroline

Verlag: LinkedIn

Kategorie: eLearning, Software & Programmieren, IT

1916 Exemplare
1916 Verfügbar
0 Vormerker

Max. Ausleihdauer: 180 Tage