• Online, Self-Paced
Course Description

The Open Web Application Security Project (OWASP) Top 10 lists the most serious and prevalent security vulnerabilities identified for web applications. This course explains the second vulnerability identified in the OWASP Top 10, Broken Access Control, and the mitigations you can use to reduce the risk to your application. After completing this course, you will be able to determine if a web application is vulnerable to Broken Access Control and explain how to protect the application against this security.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills to:

  • Determine if a web application is vulnerable to Broken Access Control
  • Explain how to protect the application against this security vulnerability

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.