OWASP: Forgery and Phishing

Category
Software
Level
Beginner
Lessons
10
Duration
39m 45s
Last Updated: 2018-09-18
We will begin this course by discussing cross-site request forgery, which takes advantage of an authenticated user by submitting additional and unexpected requests against a vulnerable site from another location. This can be from either another site or a phishing email.

We will then talk about vulnerable components. Using components and APIs can provide functionality that takes a lot of time to code, but including them means we need to be diligent. This section will provide strategies to help you stay up to date with patches.  

Lastly, we will discuss redirects, where we will explain the related issues and provide some approaches you can use to minimize the effects.
Category
Software
Level
Beginner
Lessons
10
Duration
39m 45s
OWASP: Forgery and Phishing
Mike Benkovich
I deliver technical presentations around the U.S. as a consultant, trainer, and former Developer Evangelist for Microsoft. I have worked in a variety of professional roles, including architect, project manager, developer, and technical writer. I’m also an author of two books, published by WROX Press and APress, that show developers how to get the most from their SQL databases. Since appearing in the 1994 Microsoft DevCast, I have presented technical information at seminars, conferences, and corporate boardrooms across America.
Mike BenkovichPresenter, Trainer, Author, Instructor
Other Courses by Mike Benkovich