February 2019
Intermediate to advanced
256 pages
7h 34m
English
The following describes the scope of infrastructure security testing:
| Infrastructure/platform security | Description | Open source tools and resources |
| Known vulnerable components | The known vulnerable (CVE) component is one of OWASP top 10 threats. If one component is exploited, the application can be vulnerable to remote injection or data leakage security risks. |
|
| Secure configuration | The secure configuration is to ensure the OS, Web, virtualization, and databases are configured securely, such as password complexity, removal of default settings, or disable unnecessary services. |
|
| Insecure network communication ... |
Read now
Unlock full access