CompTIA PenTest+: Application-Based Vulnerabilities
Intermediate
- 10 Videos | 52m 4s
- Includes Assessment
- Earns a Badge
There are common exploits and vulnerabilities of applications and programs that security professionals be aware of. During this course, you will explore topics such as injection attacks, authentication and authorization exploits, cross-site scripting attacks, cross-site request forgery, clickjacking, security misconfiguration, file inclusion exploits, and unsecure code practices. This course can be used as part of the preparation for the PT0-001: CompTIA PenTest+ certification exam. As a review exercise, you will list three types of exploits from SQL injection attacks, name three SQLi attack tools, and name five unsecure coding practices.
WHAT YOU WILL LEARN
-
identify injection attacksdefine authentication exploitsdescribe authorization exploitsrecognize XSS attacksrecognize CSRF/XSRF attacks
-
define clickjackingcompare security misconfigurationsdescribe file inclusion exploitsdescribe unsecure coding practicesdescribe application exploits
IN THIS COURSE
-
1.Injection Attacks8m 43sUP NEXT
-
2.Authentication Exploits5m 31s
-
3.Authorization Exploits2m 35s
-
4.Cross-Site Scripting Attacks (XSS)8m 39s
-
5.Cross-Site Request Forgery (CSRF/XSRF)6m 53s
-
6.Clickjacking2m 51s
-
7.Security Misconfiguration6m 17s
-
8.File Inclusion Exploits4m 27s
-
9.Unsecure Code Practices4m 1s
-
10.Exercise: Application Exploits2m 7s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.