CEH v12: Web Application Attacks and Vulnerabilities

CEH v12    |    Intermediate
  • 3 videos | 1h 8m 58s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Web applications are typically the face of most organizations today. It's how customers interact with an organization's services, which makes for an inviting target for attackers. In this course, you'll examine the details of web applications, including their commonly used technologies, associated risks, and defenses. Next, you'll explore the OWASP Top 10 Web Application Attacks document, one of the best resources for understanding web application security vulnerabilities, and learn how to use common attacks as ethical hackers and protect against them as defenders. Finally, you'll learn about unvalidated redirects and forwards and how they can be used to access protected data. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.

WHAT YOU WILL LEARN

  • Recognize the details of web applications
    describe techniques for testing and protecting web applications
    describe techniques and technologies used by web applications
    recognize defenses that can be used to protect web applications
    Recognize the owasp top 10 web application attacks
  • describe an owasp top 10 web application attack and how to protect against it
    describe how an owasp top 10 web application attack works
    distinguish between the owasp top 10 web application attacks
    Describe unvalidated redirects and forwards
    recognize how to mitigate unvalidated redirects and forwards

IN THIS COURSE

  • Locked
    1.  Web App Concepts
    21m 35s
    Upon completion of this video, you will be able to identify the details of web applications, including their commonly used technologies, associated risks, and defenses. FREE ACCESS
  • Locked
    2.  OWASP Top 10 Web Application Attacks
    25m 40s
    After completing this video, you will be able to recognize common web app attacks listed in the OWASP Top 10 Web Application Attacks document, as well as how to use them as ethical hackers and protect against them as defenders. FREE ACCESS
  • Locked
    3.  Unvalidated Redirects and Forwards
    21m 43s
    Upon completion of this video, you will be able to describe unvalidated redirects and forwards and how they can be used to access protected data. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 242 users Rating 4.6 of 242 users (242)
Rating 4.7 of 23 users Rating 4.7 of 23 users (23)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)