Skip main navigation

Mitigation

In this video, you will learn how to address typical vulnerabilities from security misconfigurations.

In this video, you will learn how to address typical vulnerabilities from security misconfigurations.

Now that you have learned about security misconfigurations and how to take advantage of them using the OWASP Juice Shop, this video will show you how to assess the source code to identify these vulnerabilities. You will also learn about changes you can make to mitigate these vulnerabilities.

Investigate and share: Go to OWASP Security Misconfiguration for the full information on the table shown at the start of this section. What additional information did you learn?

Prepare for the Test of the Week

You have completed the content for this week! You are now ready to move on to the Test of the Week.

The following test is going to assess your understanding of what you have learned within this past week of the course.

Remember, you do not have to take the test until you’re ready. To help you prepare, you might wish to spend some time refreshing your understanding of the contents of the past week.

You may wish to reflect on the Learning Outcomes introduced at the beginning of the week and make sure you are comfortable that you have met the requirements of each. Take some time to review your learning to help you prepare.

This article is from the free online

Advanced Cyber Security Training: OWASP Top 10 and Web Application Fundamentals

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now