The Open Web Application Security Project (OWASP) Top 10 lists the most serious and prevalent security vulnerabilities identified for web applications. This course explains the second vulnerability identified in the OWASP Top 10, Broken Access Control, and the mitigations you can use to reduce the risk to your application. After completing this course, you will be able to determine if a web application is vulnerable to Broken Access Control and explain how to protect the application against this security.
On successful completion of this course, learners should have the knowledge and skills to:
- Determine if a web application is vulnerable to Broken Access Control
- Explain how to protect the application against this security vulnerability