Web App Pen Testing: Mapping
Offered By: Pluralsight
Course Description
Overview
Understanding the target is a critical component of any offensive operation. This course will teach you how to gain a thorough understanding of web applications in order to maximize the potential for vulnerability discovery.
Understanding web applications from a user’s perspective is critical to establishing a foundation for vulnerability discovery. In this course, Web App Pen Testing: Mapping, you’ll learn how to analyze applications from a user's perspective to gain a thorough understanding of why and how applications are built while simultaneously resolving known attack surfaces. First, you’ll learn to create site maps through manual and automated techniques while gaining a functional understanding of applications. Next, you’ll explore techniques for identifying technologies implemented on both the server and client-side of applications. Finally, you’ll learn about architectural design patterns, how they affect the Web App Pen Testing methodology, and how to determine the pattern applied to build an application. When you’re finished with this course, you’ll have the skills and knowledge of Mapping web applications needed to maximize the potential for vulnerability discovery in the next step of the methodology.
Understanding web applications from a user’s perspective is critical to establishing a foundation for vulnerability discovery. In this course, Web App Pen Testing: Mapping, you’ll learn how to analyze applications from a user's perspective to gain a thorough understanding of why and how applications are built while simultaneously resolving known attack surfaces. First, you’ll learn to create site maps through manual and automated techniques while gaining a functional understanding of applications. Next, you’ll explore techniques for identifying technologies implemented on both the server and client-side of applications. Finally, you’ll learn about architectural design patterns, how they affect the Web App Pen Testing methodology, and how to determine the pattern applied to build an application. When you’re finished with this course, you’ll have the skills and knowledge of Mapping web applications needed to maximize the potential for vulnerability discovery in the next step of the methodology.
Syllabus
- Course Overview 1min
- Methodology: Mapping 19mins
- Mapping: Manual Crawling 25mins
- Mapping: Automated Crawling 17mins
- Mapping: Identifying Implemented Technologies 22mins
- Mapping: Architectural Design Patterns 23mins
Taught by
Pluralsight
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX