Time
2 hours 38 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

In part 2 of the OWASP threat database we discuss top threats 6-10: - Sensitive data exposure - protecting data both at rest and in transit - Missing function level access control - access control methods - Cross site request forgery - session hijacking, use unique session tokens. - Known vulnerable component usage - avoid deprecated code or APIs - Unvalidated redirects and forwards - threats from phishing or malware sites We underscore that the importance of OWASP and other threat databases is to develop an awareness of the most common threats and then find ways to mitigate them.

Up Next

Security Operations

They are responsible for knowing where a network's possible vulnerabilities are and providing mitigation strategies to combat them. An effective Cyber Security Operations Manager will have experience in a technical security role including ...

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor