Course Content

Module 1: Introduction

01:23
1.1 Intro
08:40
1.2 Explanations

Module 2: Demonstration

05:05
2.1 Dir Demo
05:32
2.2 XXE Demo
07:54
2.3 User Agent Demo

Module 3: Defenses

08:58
3.1 Defenses

Module 4: Lab Solutions

01:55
4.1 Lab Solutions
00:00
4.2 Security Misconfigurations

Course Description

What are security misconfigurations? Security Misconfiguration arises when security settings are defined, implemented, and maintained as defaults. Why do I need this certification? If a system is compromised through faulty security configurations, data can be stolen or modified slowly over time and can be time-consuming and costly to recover. What will I learn? What security misconfigurations are How they work How to protect against them Get your Security Misconfigurations Certification Today: Security Misconfiguration arises when Security settings are defined, implemented, and maintained as defaults. Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server, and platform. Defaults are often insecure, so secure settings should be defined, implemented, and maintained regularly. Attackers find these misconfigurations through unauthorized access to default accounts, unused web pages, unpatched flaws, unprotected files and directories and more. If a system is compromised through faulty security configurations, data can be stolen or modified slowly over time and can be time-consuming and costly to recover. The Security Misconfigurations Micro Certification will explore security misconfigurations in detail, ensuring you will learn how to combat and protect against this type of attack.SEL

Provided By

Cybrary Logo

Course Components

On Demand Videos to learn from industry leaders
Assessments to gauge understanding and comprehension

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Security Misconfigurations Certificate of Completion