DES 280 – OWASP M10: Mitigating Extraneous Functionality
COURSE OVERVIEW
In this course, you will learn how to mitigate the risks associated with extraneous functionality. Typically, an attacker seeks to understand extraneous functionality within a mobile app in order to discover hidden functionality in backend systems. The attacker will typically exploit extraneous functionality directly from their own systems without any involvement by end-users.
After completing this course you will be able to:
- Identify Extraneous Functionality
- Understand how an attacker might exploit this vulnerability in your software
- Mitigate exposure to this threat
COURSE DETAILS
Course Number: DES 277
Course Duration: 12 minutes
Course CPE Credits: 25
Related Subject Matter
CWE
NICE
NIST
Penetration Testing
Foreign Languages Available:
English
COURSE OVERVIEW
In this course, you will learn how to mitigate the risks associated with extraneous functionality. Typically, an attacker seeks to understand extraneous functionality within a mobile app in order to discover hidden functionality in backend systems. The attacker will typically exploit extraneous functionality directly from their own systems without any involvement by end-users.
After completing this course you will be able to:
- Identify Extraneous Functionality
- Understand how an attacker might exploit this vulnerability in your software
- Mitigate exposure to this threat
COURSE DETAILS
Course Number: DES 277
Course Duration: 12 minutes
Course CPE Credits: 25
Related Subject Matter
CWE
NICE
NIST
Penetration Testing
Foreign Languages Available:
English