Ethical Hacker: Common Web App Threats Part 2
Ethical Hacker 10
| Intermediate
- 2 videos | 51m 37s
- Includes Assessment
- Earns a Badge
Discover attacks against web apps using weak or broken authentication methods, and how cross-site scripting can be used to execute code. This course will help prepare you for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify attacks that can exploit weak authentication methods, identify methods to protect against data leaking, recognize the potential dangers of poor encoding practices, identify the types of cross site scripting (XSS) and associated vulnerabilities, recognize potential dangers inherent in running web applications, and mitigate the dangers of using Indirect Object References (IDOR) in web applications.
WHAT YOU WILL LEARN
-
Recognize the potential dangers of poor encoding practicesidentify attacks that can exploit weak authentication methodsidentify methods to protect against data leaking
-
Identify the types of cross site scripting (xss) and associated vulnerabilitiesrecognize potential dangers inherent in running web applicationsmitigate the dangers of using indirect object references (idor) in web applications
IN THIS COURSE
-
26m 31s
-
25m 7s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.