Buffer Overflow - No BG music
Broken Access Control
This module defines and explains broken access control, which allows attackers to access unauthorized functionality and/or data.
Using Components with Known Vulnerabilities
This module discusses use of components with known vulnerabilities (such as libraries and frameworks) that may undermine application defenses and enable various attacks.
OWASP A2 - Broken Authentication
This module covers authentication vulnerabilities and session management.
Infosec Named a Leader in 2019 Gartner Magic Quadrant
Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.