Chevron Left
返回到 OWASP Top 10 - Risks 6-10

学生对 信息安全 提供的 OWASP Top 10 - Risks 6-10 的评价和反馈


In this course, we will examine Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, and Server-Side Request Forgery (SSRF). We’ll use demos, graphics and real-life examples to help you understand the details of each of these risks....



1 - OWASP Top 10 - Risks 6-10 的 1 个评论(共 1 个)

创建者 Pablo F

Oct 6, 2022