1 / 1

SEC 340 EXceptional Education/snaptutorial.COM

Investigating Web Attacks" Your labs and readings this week focus on web attacks. These are the most common attacks that against which businesses must protect. A web server sits in the perimeter of our network and directly connects

Download Presentation

SEC 340 EXceptional Education/snaptutorial.COM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SEC 340 Week 8 Discussion Investigating Web Attacks For more classes visit www.snaptutorial.com "Investigating Web Attacks" Your labs and readings this week focus on web attacks. These are the most common attacks that against which businesses must protect. A web server sits in the perimeter of our network and directly connects to the Internet. After you’ve completed your lessons and labs, address the following: • Review https://www.owasp.org/index.php/Main_Page (OWASP). After reviewing the site, what are your thoughts about the OWASP project and why do youthink this would be a useful resource. Be detailed in your response so we can see what you’ve learned. What do you think is a useful purpose of WebGoat? Share a couple of tools from this site with your classmates, and provide a summary of how you think the tool could be useful to you in an investigation. Sharethe links with your classmates. • After reading a few classmate postings, reply to the ones where you learned something new, or have something to add. Post early and often, interaction isthe key to successful discussions. • Additional post option: What are the top 10 mistakes made in web development that can be exploited? How might this knowledge help you as a network or security administrator? ***************************************

More Related