In this course, we will examine Injection Attacks, Broken Authentication, Sensitive Data Exposure, XML External Entities (XXE) and Broken Access Control. We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks. You’ll learn a lot and have a great time doing it!
Risk One - InjectionDuration: 35:07
Injection DemoDuration: 4:24
Risk Two - Broken AuthenticationDuration: 50:16
Risk Three - Sensitive Data ExposureDuration: 50:34
Risk Four - XXEDuration: 40:53
Risk Five - Broken Access ControlDuration: 35:02
Meet the author
John Wagnon is a Senior Solution Developer for F5 Network’s DevCentral technical community where he utilizes the full spectrum of F5 technology to analyze and solve complex problems for F5 users all over the world. John is certified in several industry-relevant areas including CISSP, Certified Ethical Hacker and Six Sigma (Process Improvement).
Prior to his work at F5, John was a Communications Officer in the U.S. Air Force where he specialized in ground and satellite networks. After leaving the Air Force, he worked for a technology consulting firm where he analyzed cyber-attacks against U.S. Department of Defense computer systems and networks. John holds a Bachelor of Science in Computer Engineering and a Master of Science in Computer Networks.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."