CEH v11: Web Server Hacking, Attacks & Attack Methodologies
Ethical Hacker v11
| Intermediate
- 3 Videos | 1h 1m 9s
- Includes Assessment
- Earns a Badge
Having a web presence is almost a necessity in today's business age, but web applications can be very complicated and difficult to build securely. This includes the web server that runs the app. In this course, you'll explore the web server, its function, common components that can lead to vulnerabilities, and security controls to help mitigate those possible vulnerabilities. Next, you'll examine common web server attacks such as directory traversal, HTTP response splitting, and Server-side Request Forgery. Finally, you'll learn how following an established attack methodology will increase your likelihood of success when attacking a web server, and examine a common web server attack methodology and tools and techniques used at each step. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.
WHAT YOU WILL LEARN
-
identify security controls that can help mitigate possible vulnerabilitiesrecognize where web server configuration files and common components are storeddescribe the function of a web server and it common componentsdescribe the common web server attacksrecognize the directory traversal web server attack pattern
-
work with the HTTP response splitting web server attackrecognize tools that can be used to perform common web server attacksidentify the components of the web server attack methodologyrecognize common web server attack methodology techniquesdescribe the tools used for each step of the web server attack methodology
IN THIS COURSE
-
1.Web Server Hacking Concepts19m
-
2.Web Server Attacks23m 1s
-
3.Web Server Attack Methodology19m 8s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.