In this course, you will learn about the impact of incorrect script development or lax security measures. You will also learn about the most common scripting vulnerabilities, including cached secrets, a variety of injection vulnerabilities, weaknesses related to permissions and privileges, and types of denial of service issues that commonly affect scripts.
On successful completion of this course, learners should have the knowledge and skills to:
- Identify major outcomes of vulnerable scripts
- Identify common scripting vulnerabilities such as SQL injection
- Identify security issues related to permissions and privileges
- Describe the impact of different types of resource exhaustion