Course Details

Previous Page


Certified Ethical Hacker (CEH): Hacking Web Applications


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Web applications provide the interface between end users and web servers. In this course, we look at web application attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers This course is the eleventh in a series of courses which can used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures V8 course materials and labs.

Target Audience
Network and information security professionals

Prerequisites
None

Expected Duration (hours)
1.5

Lesson Objectives

Certified Ethical Hacker (CEH): Hacking Web Applications

  • identify common attack vectors for web applications
  • identify command injection attacks
  • match the layer to the web service attack type that can be performed at that layer
  • match the hacking activity to the stage in the web application hacking methodology
  • match the web application hacking countermeasure to the type of attack it helps defend against
  • determine what you test for at which stage of web application penetration
  • identify web application hacking techniques and tools and how to counter them
  • Course Number:
    sp_ceth_a11_it_enus