Explore broken access control and security misconfiguration, the fifth and sixth categories of security vulnerabilities in the OWASP Top 10.
- Many of the high profile data breaches that you read about in the news results from a failure to follow basic security procedures. Time and again, hackers will exploit companies with faulty access control and security misconfiguration issues. The open web application security project provides a list that describes some of the most common security vulnerabilities. It's called the OWASP Top 10 and it can help you learn about how to address these in your organization software. In this course, I'm going to talk about vulnerability categories number five and number six. Broken access control and security misconfiguration. The concepts are simple, but that doesn't mean they're easy to avoid. Throughout this course, I'll describe how broken access control and security misconfiguration work. We'll examine some real life examples and their impact to companies and consumers. I'll also provide you with prevention techniques so that you know how to address these types of issues in the future. Hi, I'm Caroline Wang and I'm the Chief Security Strategist at Cobalt.io. Come and join me in my LinkedIn learning course on the OWASP Top 10, numbers five and six.