Course Description
In this course, you will learn how to mitigate the risks associated with Insecure Authentication which is typically exploited through automated attacks that use available or custom-built tools.
Learning Objectives
On successful completion of this course, learners should have the knowledge and skills to:
- Identify the most common security flaws in mobile apps related to insecure authentication
- Understand how an attacker might exploit such vulnerabilities in your software
- Eliminate or mitigate exposure to these common security threats
Framework Connections
Specialty Areas
- Risk Management
- Software Development
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.