CompTIA PenTest+: Application-based Attacks
CompTIA
| Intermediate
- 15 videos | 1h 24m 53s
- Includes Assessment
- Earns a Badge
Application-based attacks are designed to deliberately cause a fault in a computer's operating system or applications. In this course, you'll learn how to research attack vectors and perform application-based attacks. You'll explore the benefits of the OWASP Top 10 standard awareness document, which is used to present the most critical security risks to web applications. You'll examine application-based attacks such as server-side request forgery, business logic flaws, and injection attacks. You'll move on to learn about application vulnerabilities such as race conditions, lack of code signing, and session attacks, as well as the characteristics of API attacks such as Restful, Soap, and Extensible Markup Language-Remote Procedure Call. Lastly, you'll learn about application-based attack tools and resources. This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-002) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of the owasp top 10 standard awareness documentProvide an overview of server-side request forgery (ssrf) attacksDescribe how business logic vulnerabilities can be exploitedRecognize characteristics of a structured query language (sql) injection attackProvide an overview of command injection attacksDescribe how to perform cross-site scripting (xss) attacksList characteristics of a lightweight directory access protocol (ldap) injection attack
-
Differentiate between race conditions, lack of error handling, lack of code signing, and insecure data transmission application vulnerabilitiesDifferentiate between session attacks including session hijacking, cross-site request forgery (csrf), privilege escalation, session replay, and session fixationProvide an overview of application programming interface (api) attacksRecognize how directory traversal attacks workDifferentiate between application-based attack tools such as sqlmap and dirbusterProvide an overview of the benefits offered by resources such as wordlistsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 38s
-
10m 20s
-
6m 34s
-
5m 59s
-
8m 3s
-
5m 41s
-
4m 30s
-
4m 47s
-
6m 56s
-
9m 52s
-
8m 26s
-
3m 56s
-
3m 24s
-
3m 48s
-
1m 1s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.