CEH v11: Web Application Hacking & Login Attacks

Ethical Hacker v11    |    Intermediate
  • 3 videos | 1h 1m 47s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 23 users Rating 4.7 of 23 users (23)
The key to success when security testing a web application is making sure you have an effective plan. In this course, you'll explore the common web app hacking methodology, as described by EC-Council. Next, you'll learn how the tools you have at your disposal will be crucial to your success when testing the security of any web application. Finally, getting past the login page of a web application can be a common first stop for security researchers, so you'll examine how to accomplish this using techniques like injection and brute-force attacks. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.

WHAT YOU WILL LEARN

  • Identify the stages of the web app hacking methodology
    recognize the purpose of the web app hacking methodology steps
    recognize the common web app hacking methodology
    Identify the advantages of different web app hacking tools
    recognize the command line tools uses for web app hacking
    describe specialty web app hacking tools that are useful for specific types of web sites
  • recognize commonly used web app hacking tools
    Recognize the tools and techniques used to do a brute force attack against a web site login page
    recognize the tools used to automate sql injection attacks against a web page login form
    recognize how the sql injection technique can be used to bypass a login page
    identify the types of inputs used to attack a target using sql injection

IN THIS COURSE

  • Locked
    1.  Web App Hacking Methodology
    16m 18s
    After completing this video, you will be able to recognize the purpose of the web app hacking methodology steps. FREE ACCESS
  • Locked
    2.  Web App Hacking Tools
    24m 11s
    In this video, find out how to identify the advantages of different web app hacking tools. FREE ACCESS
  • Locked
    3.  Web App Login Attacks
    21m 19s
    Learn how to identify the types of inputs used to attack a target using SQL Injection. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 19 users Rating 4.6 of 19 users (19)
Rating 4.7 of 40 users Rating 4.7 of 40 users (40)
Rating 4.7 of 24 users Rating 4.7 of 24 users (24)