Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

OWASP Top 10: Injection Attacks

Course Cover
compare button icon

Course Features

icon

Duration

4 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

4 hours

Course Description

OWASP Top 10 Injection Attacks is a part of all of the OWASP Top 10 Security Risks for Web Applications Injection attacks. The 2017, OWASP Top 10 injection was the top spot and is now down to 3rd for 2021's OWASP top 10. This course will cover the various types of attacks that are based on injection, such as email headers, shell injection and SQL injection. Learn how to recognize them and eliminate the spread of these attacks to your system.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

Learn Python 3

What You Will Learn

Identify and prevent email header injection

Identify and prevent shell injection

Identify and prevent SQL injection

Course Instructors

Author Image

Jonathan Chery

Curriculum Developer at Codecademy, specializing in cybersecurity

Jonathan Chery is a Curriculum Developer in the Cybersecurity domain at Codecademy. He has a Bachelor's in Computer Science from York College, City University of New York, and a Master's degree in Computer Science from Northeastern University.
Course Cover