Specialized Testing: Command Injection
Offered By: Pluralsight
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Poor web application security hygiene can lead to total network compromise. This course will teach you to identify the vectors and techniques threat actors use to gain access to networks and systems using command injection.
According to the globally recognized Open Web Application Security Project (OWASP), command injection is among the top three critical web application vulnerabilities that allow attackers to gain control over systems where they can attack infrastructure, steal information, and many other malicious actions. In this course, Specialized Testing: Command Injection, you’ll learn to identify, test, and mitigate vectors and techniques threat actors use to perform command injection. First, you’ll explore the mechanics of command injection. Next, you’ll discover how to find and test vulnerable web application entry points for command injection. Finally, you’ll learn how to deploy mitigation strategies. When you’re finished with this course, you’ll have the skills and knowledge of testing for command injection needed to audit web applications.
According to the globally recognized Open Web Application Security Project (OWASP), command injection is among the top three critical web application vulnerabilities that allow attackers to gain control over systems where they can attack infrastructure, steal information, and many other malicious actions. In this course, Specialized Testing: Command Injection, you’ll learn to identify, test, and mitigate vectors and techniques threat actors use to perform command injection. First, you’ll explore the mechanics of command injection. Next, you’ll discover how to find and test vulnerable web application entry points for command injection. Finally, you’ll learn how to deploy mitigation strategies. When you’re finished with this course, you’ll have the skills and knowledge of testing for command injection needed to audit web applications.
Syllabus
- Course Overview 1min
- Exploring Command Injection Attacks 11mins
- Discovering Command Injection 27mins
- Mitigating Command Injection Attacks 22mins
Taught by
Michael Edie
Related Courses
Hacking and PatchingUniversity of Colorado System via Coursera Identifying Security Vulnerabilities
University of California, Davis via Coursera Input Validation Testing with Burp Suite
Pluralsight Ivanti Connect Secure VPN Vulnerability: What You Should Know
Pluralsight Complete Website Ethical Hacking and Penetration Testing
Udemy