Course contentsShow
Security
Lesson 937 of 3,05219. Web Security - Business Logic VulnerabilitiesPro lesson

Mapping Business Workflows

Techniques for documenting application workflows, state transitions, and business rules to identify testable attack surfaces.

This lesson is for subscribers

You've completed the free preview. Subscribe to unlock every lesson in every course.