DES 280 – OWASP M10: Mitigating Extraneous Functionality
Rated 3.5/5 based on 11 customer reviews

DES 280 – OWASP M10: Mitigating Extraneous Functionality

Available: In Stock
$795.00

Image

COURSE OVERVIEW

In this course, you will learn how to mitigate the risks associated with extraneous functionality. Typically, an attacker seeks to understand extraneous functionality within a mobile app in order to discover hidden functionality in backend systems. The attacker will typically exploit extraneous functionality directly from their own systems without any involvement by end-users.

After completing this course you will be able to:

  • Identify Extraneous Functionality
  • Understand how an attacker might exploit this vulnerability in your software
  • Mitigate exposure to this threat

COURSE DETAILS

Course Number: DES 277

Course Duration: 12 minutes

Course CPE Credits: 25

 

Related Subject Matter

CWE

NICE

NIST

Penetration Testing


Foreign Languages Available:

English

COURSE OVERVIEW

In this course, you will learn how to mitigate the risks associated with extraneous functionality. Typically, an attacker seeks to understand extraneous functionality within a mobile app in order to discover hidden functionality in backend systems. The attacker will typically exploit extraneous functionality directly from their own systems without any involvement by end-users.

After completing this course you will be able to:

  • Identify Extraneous Functionality
  • Understand how an attacker might exploit this vulnerability in your software
  • Mitigate exposure to this threat

COURSE DETAILS

Course Number: DES 277

Course Duration: 12 minutes

Course CPE Credits: 25

 

Related Subject Matter

CWE

NICE

NIST

Penetration Testing


Foreign Languages Available:

English