Cross-Site Request Forgery (CSRF)
In this module, we’ll review common exploitation techniques and ways learners can protect applications from cross-site request forgery.
Insufficient Logging and Monitoring
It is imperative that server administrators maintain robust logs of activity on their servers. This module covers the risks associated with improper monitoring.
Insufficient Attack Protection
Deploying sufficient attack protection is essential to keeping sensitive information safe from hacking attempts. In this module, we’ll discuss web-application requirements regarding detection, prevention and response to both manual and automated attacks.
Infosec Named a Leader in 2019 Gartner Magic Quadrant
Recognized for ability to execute and completeness of vision in Security Awareness Computer-Based Training, learn the latest market trends and what we believe sets Infosec apart.