Train your skills in cyber security

Cross-Site Request Forgery

As a learner of this course, you will be introduced to some of the basic techniques that are used in CSRF cyberattacks to manipulate web applications. Potential consequences from successful attacks are discussed and protection techniques used by security professionals as defence against this attack type are presented. Finally, you are granted access to the AAU virtual cyber platform HAAUKINS, where you have the opportunity to put your newly acquired knowledge to the test. In a closed virtual environment you’ll be able to locate potential targets vulnerable to CSRF and complete an attack yourself.

Read more and take the course: https://cybertraining.dk/csrf/#/

Developed by