Broken Authentication and Session Management
Cross-Site Request Forgery (CSRF)
In this module, we’ll review common exploitation techniques and ways learners can protect applications from cross-site request forgery.
Insufficient Attack Protection
Deploying sufficient attack protection is essential to keeping sensitive information safe from hacking attempts. In this module, we’ll discuss web-application requirements regarding detection, prevention and response to both manual and automated attacks.
OWASP Top Ten Overview
This module will cover the Open Web Application Security Project’s list of the ten most dangerous Web application security flaws.