Cybersecurity
Showing 1177–1188 of 1211 results
Web Application Penetration Testing: Business Logic Testing
Business logic flaws are context specific and very hard for automated tools to discover. This course will teach you how to identify and exploit business logic vulnerabilities.
Web Application Penetration Testing: Client-side Testing
Do not let hackers execute different client-side attacks on your website. This course will teach you how to be proficient in performing client-side attacks like Cross Site Scripting, HTML Injection, Client-side redirects, and explain how to fix them.
Web Application Penetration Testing: Configuration and Deployment Management Testing
This course will teach you how to perform systematic penetration testing of configuration and deployment management using OWASP principles.
Web Application Penetration Testing: Information Gathering
This course will teach you about web application information gathering which you can use to craft your defenses, since a web application is only as strong as its weakest link.
Web Application Penetration Testing: Input Validation
In this course, you’ll learn how to test for input validation in web applications. The majority of attacks on web applications are related to improper input validation and that’s the reason why this subject is interesting for penetration testers.
Web Application Penetration Testing: Insecure Error Handling
In this course, you'll learn how severe consequences can happen as a result of insecure error handling in modern web applications. You'll see how to test web applications for insecure error handling and how to prevent these problems from happening.
Web Application Penetration Testing: Session Management Testing
Learn what to look for while penetration testing session management using OWASP principles including brute-forcing, taking advantage of poorly implemented session fixation, and POST and GET requests implemented incorrectly to find weak spots.
Web Application Penetration Testing: Weak Cryptography
Cryptography is used to secure modern web applications. The problem is that quite many things can go wrong and weak cryptography can lead to very severe consequences. That’s why this subject is interesting for penetration testers.
Web Hacking for Beginners
Learn how to exploit and secure websites.
What is a Cyberattack?
What is Cyberattack?, Outsider threats, Insider threats, What are common types of cyberattacks?, Backdoor Trojan, Cross site scripting (XSS) attack, Denial of service (DoS), DNS tunneling, and More
whats app hacking ethical hacking
Finding Vulnerability
Why Even MFA?
In this session, Max Clemens will introduce MFA and pull back the covers of how it works.