Skip main navigation

Learning Outcomes

Understand what is in store for the week.
Abstract multi-colored glowing data wave on a dark background
In the coming week, we will focus on:

  • sensitive data exposure
  • XML external entities
  • broken access control
  • security misconfiguration

By the end of this week, you will be able to:

  • describe how sensitive data is vulnerable to hackers
  • describe the vulnerabilities associated with XXE
  • describe the importance of an authorization hierarchy for users
  • explain the importance of appropriate security configuration

When you are ready, move on to the first video to get started!

This article is from the free online

Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now