OWASP A5 and A1: Security and Injection


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
OWASP Top 10 list items 5 and 1 cover security misconfigurations and injection, two highly common attacks in modern web applications

Target Audience
Individuals who wish to increase their knowledge in the field of web application security and common exploits used against web applications

Prerequisites
None

Expected Duration (hours)
1.2

Lesson Objectives

OWASP A5 and A1: Security and Injection

  • start the course
  • explain what Security Misconfigurations are
  • how Security Misconfigurations can be exploited and what kind of access is needed to exploit it
  • how easy it is to detect Security Misconfigurations and how common they are
  • the technical and business impacts of Security Misconfigurations
  • provide examples of Security Misconfiguration attacks
  • enable protection for a web app through a WAF
  • explain what Injection is
  • how Injection can be exploited and what kind of access is needed to exploit it
  • how easy it is to detect Injection and how common they are
  • the technical and business impacts of Injection attacks
  • provide examples of Injection attacks
  • inject SQL commands into a web form field
  • explain how A5 and A1 can be exploited by attackers
  • Course Number:
    sp_owtt_a06_it_enus

    Expertise Level
    Intermediate