• Online, Self-Paced
Course Description

This lab presents a challenge in the Shadow Bank cyber range that exploits a Broken Access Control vulnerability, caused in part by missing or broken input validation and a business logic flaw. According to OWASP.org “Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification or destruction of all data, or performing a business function outside of the limits of the user.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills required to:

  • Understand how adversaries can exploit failures in access control mechanisms by penetrating the application and acting outside of the intended permissions for the logged-in user

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.