Web Application Penetration Testing: Configuration and Deployment Management Testing
Offered By: Pluralsight
Course Description
Overview
This course will teach you how to perform systematic penetration testing of configuration and deployment management using OWASP principles.
Learn how to test the deployed configuration that your applications are released on. In this course, Web Application Penetration Testing: Configuration and Deployment Management Testing, you'll learn how to perform systematic configuration and deployment management testing to ensure that misconfigurations, or mistakes made during application deployment, do not provide opportunities for attackers to compromise infrastructures or applications. First, you'll discover how to validate network and infrastructure configuration. Next, you'll explore testing the platform that applications are deployed upon. Then, you'll learn how to ensure that backup configurations and administrative interfaces do not open you up to attacks. Finally, you'll go through testing cross-domain policies for rich internet applications. By the end of this course, you'll have an understanding of how OWASP testing principles can be leveraged to systematically test configuration and deployment management.
Learn how to test the deployed configuration that your applications are released on. In this course, Web Application Penetration Testing: Configuration and Deployment Management Testing, you'll learn how to perform systematic configuration and deployment management testing to ensure that misconfigurations, or mistakes made during application deployment, do not provide opportunities for attackers to compromise infrastructures or applications. First, you'll discover how to validate network and infrastructure configuration. Next, you'll explore testing the platform that applications are deployed upon. Then, you'll learn how to ensure that backup configurations and administrative interfaces do not open you up to attacks. Finally, you'll go through testing cross-domain policies for rich internet applications. By the end of this course, you'll have an understanding of how OWASP testing principles can be leveraged to systematically test configuration and deployment management.
Syllabus
- Course Overview 1min
- Introduction 4mins
- Testing Network and Infrastructure Configuration 14mins
- Testing Application Platform Configuration 18mins
- Testing File Handling 22mins
- Looking for Sensitive Information 24mins
- Enumerating and Attacking Administrative Interfaces 14mins
- Testing HTTP Methods 5mins
- Testing Cross-domain Policy for Rich Internet Applications (RIA) 12mins
- Validating HTTP Strict Transport Security Headers (HSTS) 7mins
- Course Wrap Up 4mins
Taught by
Lee Allen
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent