• Online, Self-Paced
Course Description

Building authentication and session management schemes correctly is a difficult task often presenting flaws that may be equally difficult to identify. Common authentication attacks consist of brute force, insufficient authentication, and weak password recovery validation. These types of attacks target and attempt to exploit the authentication process a website uses to verify the identity of a user, service, or application. This course teaches how to execute attacks, identify vulnerabilities, and verify controls.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills to:

  • Identify common authentication vulnerabilities
  • Verify authentication controls
  • Execute dictionary attacks

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.