CompTIA PenTest+: Application-Based Vulnerabilities

Intermediate
  • 10 videos | 52m 4s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 14 users Rating 4.6 of 14 users (14)
There are common exploits and vulnerabilities of applications and programs that security professionals be aware of. During this course, you will explore topics such as injection attacks, authentication and authorization exploits, cross-site scripting attacks, cross-site request forgery, clickjacking, security misconfiguration, file inclusion exploits, and unsecure code practices. This course can be used as part of the preparation for the PT0-001: CompTIA PenTest+ certification exam. As a review exercise, you will list three types of exploits from SQL injection attacks, name three SQLi attack tools, and name five unsecure coding practices.

WHAT YOU WILL LEARN

  • Identify injection attacks
    Define authentication exploits
    Describe authorization exploits
    Recognize xss attacks
    Recognize csrf/xsrf attacks
  • Define clickjacking
    Compare security misconfigurations
    Describe file inclusion exploits
    Describe unsecure coding practices
    Describe application exploits

IN THIS COURSE

  • 8m 43s
    In this video, you will learn about injection attacks. FREE ACCESS
  • 5m 31s
    In this video, you will learn how to define authentication exploits. FREE ACCESS
  • Locked
    3.  Authorization Exploits
    2m 35s
    After completing this video, you will be able to describe authorization exploits. FREE ACCESS
  • Locked
    4.  Cross-Site Scripting Attacks (XSS)
    8m 39s
    After completing this video, you will be able to recognize XSS attacks. FREE ACCESS
  • Locked
    5.  Cross-Site Request Forgery (CSRF/XSRF)
    6m 53s
    Upon completion of this video, you will be able to recognize CSRF/XSRF attacks. FREE ACCESS
  • Locked
    6.  Clickjacking
    2m 51s
    During this video, you will learn about clickjacking. FREE ACCESS
  • Locked
    7.  Security Misconfiguration
    6m 17s
    Learn how to compare security misconfigurations. FREE ACCESS
  • Locked
    8.  File Inclusion Exploits
    4m 27s
    After completing this video, you will be able to describe file inclusion exploits. FREE ACCESS
  • Locked
    9.  Unsecure Code Practices
    4m 1s
    After completing this video, you will be able to describe insecure coding practices. FREE ACCESS
  • Locked
    10.  Exercise: Application Exploits
    2m 7s
    Upon completion of this video, you will be able to describe application exploits. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 14 users Rating 4.7 of 14 users (14)
Rating 4.6 of 41 users Rating 4.6 of 41 users (41)
Rating 4.6 of 38 users Rating 4.6 of 38 users (38)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 125 users Rating 4.6 of 125 users (125)
Rating 4.6 of 19 users Rating 4.6 of 19 users (19)
Rating 4.6 of 17 users Rating 4.6 of 17 users (17)