- Course
OWASP: Injection
Injection flaws remain a top software risk. This course will teach you how to identify, exploit, and prevent injection attacks, including SQL, NoSQL, command, template, and XSS injections.
- Course
OWASP: Injection
Injection flaws remain a top software risk. This course will teach you how to identify, exploit, and prevent injection attacks, including SQL, NoSQL, command, template, and XSS injections.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Injection vulnerabilities remain one of the most common, dangerous, and misunderstood classes of software flaws, allowing attackers to directly manipulate queries, commands, and templates. In this course, OWASP: Injection, you’ll learn to detect, exploit, and prevent injection attacks across modern applications. First, you’ll explore how SQL, NoSQL, command, template, and cross-site scripting injections work in practice and why they’re so effective. Next, you’ll discover how to use tooling and exploitation techniques to better understand the attacker’s perspective. Finally, you’ll learn how to defend against injection using parameterized queries, secure frameworks, validation, and safe coding patterns. When you’re finished with this course, you’ll have the skills and knowledge of injection vulnerabilities needed to build and review software that is hardened against real-world attacks.