Web Application Penetration Testing

 

You literally wont find this content running at any other school. 

Outline

· Module 1—Web Application (in)security

· Module 2—Core Defense Mechanisms

· Module 3—Web Application Technologies

· Module 4—Mapping the Application

· Module 5—Bypassing Client-Side Controls

· Module 6—Attacking Authentication

· Module 7—Attacking Session Management

· Module 8—Attacking Access Controls

· Module 9—Attacking Data Stores

· Module 10—Attacking Back-End Components

· Module 11—Attacking Application Logic

· Module 12—Attacking Users: Cross-Site Scripting

· Module 13—Attacking Users: Other Techniques

· Module 14—Automating Customized Attacks

· Module 15—Exploiting Information Disclosure

· Module 16—Attacking Native Compiled Applications

· Module 17—Attacking Application Architecture

· Module 18—Attacking the Application Server

· Module 19—Finding Vulnerabilities in Source Code

· Module 20—Hackers Toolkit

· Module 21—Application Hackers Methodology

 

 

Web Applications are everywhere and they are insecure. Discover how cloud architectures and social networking have added exploitable attack surfaces to applications. Learn how to break encrypted session tokens and other sensitive data found in the cloud.>

 

 

Leave a Reply

Help-Desk
UA-46837009-1