e-Ausleihe. OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Seitenbereiche:

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Person: Wong, Caroline

Year: 2019

Available

Contents:
Security-related incidents pose major threats to organizations of all sizes, as well as the customers they serve. The Open Web Application Security Project (OWASP) was formed to educate the public about some of the most common security vulnerabilities. OWASP also provides a list-the OWASP top ten-that highlights the most critical security risks out there. In this course, Caroline Wong explores broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10. Caroline explains how these threats work and provides real-life examples of how they can impact companies and consumers. Plus, she provides techniques that can help you prevent broken access control and security misconfiguration from impacting your organization.

Title: OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration

Person: Wong, Caroline

Publisher : LinkedIn

Category: eLearning, Software & Programmieren, IT

13178 Copies
13178 Available
0 Reserved items

Loan period: 180 days