Ethical Hacking: Hacking Web Applications
Pluralsight is not an official partner or accredited training center of EC-Council. Understanding how to detect and identify risks in your web applications is absolutely critical. This course goes through the risks in depth.
Pluralsight is not an official partner or accredited training center of EC-Council. The security profile of web applications is enormously important when it comes to protecting sensitive customer data, financial records, and reputation. Yet, web applications are frequently the target of malicious actors who seek to destroy these things by exploiting vulnerabilities in the software. Most attacks against web applications exploit well known vulnerabilities for which tried and tested defenses are already well-established. Learning these patterns – both those of the attacker and the defender – is essential for building the capabilities required to properly secure applications on the web today. In this course, we’ll look a range of different security paradigms within web applications both conceptually and in practice. They’ll be broken down into detail, exploited, and then discussed in the context of how the attacks could have been prevented. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking
Author Name: Troy Hunt
Author Description:
Troy Hunt is a Microsoft Regional Director and MVP for Developer Security, an ASPInsider, and a full time Author for Pluralsight—a leader in online training for technology and creative professionals. Troy has been building software for browsers since the very early days of the web and possesses an exceptional ability to distill complex subjects into relatable explanations. This has led Troy to become an industry thought leader in the security space and produce more than twenty top-rated courses … more
Table of Contents
- Understanding Security in Web Applications
39mins - Reconnaissance and Footprinting
43mins - Tampering of Untrusted Data
37mins - Attacks Involving the Client
50mins - Attacks Against Identity Management and Access Controls
30mins - Denial of Service Attacks
43mins - Other Attacks on the Server
45mins
There are no reviews yet.