Training Course

OWASP: Forgery and Phishing

Browse All Courses > Security

Have a question while you're learning?

Get in-depth explanations, tips, further insights, and more from Certified Experts. Our experts are vetted industry professionals eager to help you learn from their experiences.

Course Syllabus(10 Lessons)

OWASP: Forgery and Phishing

Course Description

We will begin this course by discussing cross-site request forgery, which takes advantage of an authenticated user by submitting additional and unexpected requests against a vulnerable site from another location. This can be from either another site or a phishing email.

We will then talk about vulnerable components. Using components and APIs can provide functionality that takes a lot of time to code, but including them means we need to be diligent. This section will provide strategies to help you stay up to date with patches.  

Lastly, we will discuss redirects, where we will explain the related issues and provide some approaches you can use to minimize the effects.

Course Details

39m 50s


Mike Benkovich
I deliver technical presentations around the U.S. as a consultant, trainer, and former Developer Evangelist for Microsoft. I have worked in a variety of professional roles, including architect, project manager, developer, and technical writer. I’m also an author of two books, published by WROX Press and APress, that show developers how to get the most from their SQL databases. Since appearing in the 1994 Microsoft DevCast, I have presented technical information at seminars, conferences, and corporate boardrooms across America.
Mike BenkovichPresenter, Trainer, Author, Instructor

Share Course

Ready to get started?