Skip main navigation

Mitigation

In this video, you will look at the application source code to assess and improve the application’s authentication processes.

In this video, you will look at the application source code to assess and improve the application’s authentication processes.

Now that you understand how authentication processes work, you will look at the source code for authentication for an application. After reviewing the initial code, the video will explain what steps can be added to the login processes to prevent a database from being hacked.

Prepare for the Test of the Week

You have completed the content for this week! Complete the poll in the next step, and then you are ready to assess your knowledge of this week’s content.

The test of the week is going to assess your understanding of what you have learned within this past week of the course.

Remember, you do not have to take the test until you’re ready. To help you prepare, you might wish to spend some time refreshing your understanding of the contents of the past week.

You may wish to reflect on the Learning Outcomes introduced at the beginning of the week and make sure you are comfortable that you have met the requirements of each. Take some time to review your learning to help you prepare.

This article is from the free online

Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now