CEH v12: Web Application Attacks and Vulnerabilities
CEH v12
| Intermediate
- 3 videos | 1h 8m 58s
- Includes Assessment
- Earns a Badge
Web applications are typically the face of most organizations today. It's how customers interact with an organization's services, which makes for an inviting target for attackers. In this course, you'll examine the details of web applications, including their commonly used technologies, associated risks, and defenses. Next, you'll explore the OWASP Top 10 Web Application Attacks document, one of the best resources for understanding web application security vulnerabilities, and learn how to use common attacks as ethical hackers and protect against them as defenders. Finally, you'll learn about unvalidated redirects and forwards and how they can be used to access protected data. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
WHAT YOU WILL LEARN
-
Recognize the details of web applicationsdescribe techniques for testing and protecting web applicationsdescribe techniques and technologies used by web applicationsrecognize defenses that can be used to protect web applicationsRecognize the owasp top 10 web application attacks
-
describe an owasp top 10 web application attack and how to protect against itdescribe how an owasp top 10 web application attack worksdistinguish between the owasp top 10 web application attacksDescribe unvalidated redirects and forwardsrecognize how to mitigate unvalidated redirects and forwards
IN THIS COURSE
-
21m 35sUpon completion of this video, you will be able to identify the details of web applications, including their commonly used technologies, associated risks, and defenses. FREE ACCESS
-
25m 40sAfter completing this video, you will be able to recognize common web app attacks listed in the OWASP Top 10 Web Application Attacks document, as well as how to use them as ethical hackers and protect against them as defenders. FREE ACCESS
-
21m 43sUpon completion of this video, you will be able to describe unvalidated redirects and forwards and how they can be used to access protected data. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.