University of Hormozgan CERT (APA)
 
Fa Sign in

Workshop on Weak Security Controls

In this workshop, participants get familiar with main weak security controls and how to resolve them. These weak controls are in the following categories:

  • Weak Security Controls leading to Information Leakage
  • Weak Configuration Management
  • Weak Authentication and Authorization
  • Weak User Input Control
  • Weak Encryption

1
Visit today: 1    Total visits: 987