Ethical Hacker: Common Web App Threats Part 2

Ethical Hacker 10    |    Intermediate
  • 2 Videos | 54m 37s
  • Includes Assessment
  • Earns a Badge
Likes 28 Likes 28
Discover attacks against web apps using weak or broken authentication methods, and how cross-site scripting can be used to execute code. This course will help prepare you for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify attacks that can exploit weak authentication methods, identify methods to protect against data leaking, recognize the potential dangers of poor encoding practices, identify the types of cross site scripting (XSS) and associated vulnerabilities, recognize potential dangers inherent in running web applications, and mitigate the dangers of using Indirect Object References (IDOR) in web applications.

WHAT YOU WILL LEARN

  • identify attacks that can exploit weak authentication methods
    identify methods to protect against data leaking
    recognize the potential dangers of poor encoding practices
  • Identify the types of cross site scripting (XSS) and associated vulnerabilities
    Mitigate the dangers of using Indirect Object References (IDOR) in web applications
    Recognize potential dangers inherent in running web applications

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 123 Likes 123  
Likes 30 Likes 30  
Likes 22 Likes 22  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 29 Likes 29  
Likes 55 Likes 55  
Likes 37 Likes 37