CEH v11: Web Application Attacks & Vulnerabilities

Ethical Hacker v11    |    Intermediate
  • 3 videos | 57m 4s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 19 users Rating 4.6 of 19 users (19)
Web applications are typically the face of most organizations today. It's how customers interact with an organization's services, which makes for an inviting target for attackers. In this course, you'll examine the details of web applications, including their commonly used technologies, associated risks, and defenses. Next, you'll explore the OWASP Top 10 Web Application Attacks document, one of the best resources for understanding web application security vulnerabilities, and learn how to use common attacks as ethical hackers and protect against them as defenders. Finally, you'll learn about unvalidated redirects and forwards and how they can be used to access protected data. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize defenses that can be used to protect web applications
    describe techniques and technologies used by web applications
    describe techniques for testing and protecting web applications
    recognize the details of web applications
    Describe an owasp top 10 web application attack and how to protect against it
  • distinguish between the owasp top 10 web application attacks
    describe how an owasp top 10 web application attack works
    recognize the owasp top 10 web application attacks
    Describe unvalidated redirects and forwards
    recognize how to mitigate unvalidated redirects and forwards

IN THIS COURSE

  • Locked
    1.  Web Application Concepts
    23m 3s
    Upon completion of this video, you will be able to recognize the details of web applications. FREE ACCESS
  • Locked
    2.  OWASP Top 10 Web Application Attacks 2017
    22m 58s
    After completing this video, you will be able to recognize the OWASP Top 10 Web Application attacks. FREE ACCESS
  • Locked
    3.  Unvalidated Redirects and Forwards
    11m 3s
    Upon completion of this video, you will be able to recognize how to mitigate unvalidated redirects and forwards. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.8 of 14 users Rating 4.8 of 14 users (14)
Rating 4.4 of 19 users Rating 4.4 of 19 users (19)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)