Web Application Penetration Testing: Information Gathering
Offered By: Pluralsight
Course Description
Overview
This course will teach you about web application information gathering which you can use to craft your defenses, test your defenses, and optimize your application security - since a web application is only as strong as its weakest link.
How can you prevent attacks if you don't know your enemy? In this course, Web Application Penetration Testing: Information Gathering, you’ll learn to better know how your enemies target you. First, you’ll explore fingerprinting web applications and their building blocks. Next, you’ll discover enumerating those applications and knowing their entry points. Finally, you’ll learn how to use all the needed tools. When you’re finished with this course, you’ll have the skills and knowledge needed to understand how information can be gathered about web targets.
How can you prevent attacks if you don't know your enemy? In this course, Web Application Penetration Testing: Information Gathering, you’ll learn to better know how your enemies target you. First, you’ll explore fingerprinting web applications and their building blocks. Next, you’ll discover enumerating those applications and knowing their entry points. Finally, you’ll learn how to use all the needed tools. When you’re finished with this course, you’ll have the skills and knowledge needed to understand how information can be gathered about web targets.
Syllabus
- Course Overview 1min
- Using Fingerprinting to Identify Targets 24mins
- Enumerating Hidden Web Apps and Search for Info Leakage 18mins
- Identifying Web Application Entry Points and Execution Paths 9mins
- Unearthing Web Application Architecture 6mins
Taught by
Malek Mohammad
Related Courses
Authentication & Authorization: OAuthUdacity Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Hacking and Patching
University of Colorado System via Coursera Fundamentals of Computer Network Security
University of Colorado System via Coursera