CEH v11: Web Application Attacks & Vulnerabilities
Ethical Hacker v11 | Intermediate
- 3 Videos | 57m 4s
- Includes Assessment
- Earns a Badge
Web applications are typically the face of most organizations today. It's how customers interact with an organization's services, which makes for an inviting target for attackers. In this course, you'll examine the details of web applications, including their commonly used technologies, associated risks, and defenses. Next, you'll explore the OWASP Top 10 Web Application Attacks document, one of the best resources for understanding web application security vulnerabilities, and learn how to use common attacks as ethical hackers and protect against them as defenders. Finally, you'll learn about unvalidated redirects and forwards and how they can be used to access protected data. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
recognize defenses that can be used to protect web applicationsdescribe techniques and technologies used by web applicationsdescribe techniques for testing and protecting web applicationsrecognize the details of web applicationsdescribe an OWASP Top 10 Web Application attack and how to protect against it
distinguish between the OWASP Top 10 Web Application attacksdescribe how an OWASP top 10 web application attack worksrecognize the OWASP Top 10 Web Application attacksdescribe unvalidated redirects and forwardsrecognize how to mitigate unvalidated redirects and forwards
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.