Skill Level Beginner
- It seems like almost every day you hear about a new data breach. What is it about software that makes it so vulnerable? My name is Caroline Wong, and I've been working in information security since 2005. For the past several years I've been focused on the area of application security. I'm here to teach you about a cybersecurity top 10 list that describes some of the most common security vulnerabilities that hackers exploit to conduct their attacks.
It's called the OWASP Top 10. This course will focus on the first two vulnerability categories: injection attacks and broken authentication. These are common attacks which have been found regularly over the past 10 years. There's actually nothing new about these attacks, and yet they continue to be effective. Throughout this course I'll describe how injection attacks and broken authentication work. We'll explore some real-life examples and their impact to companies and consumers.
I'll also provide you with prevention techniques so that you can avoid these attacks in the future. If you're ready to go, let's get started.