Web Application Penetration Testing with Burp Suite
Offered By: Pluralsight
Course Description
Overview
Want to learn how to use Burp Suite beyond just the capture of requests and responses? This course helps get you up and running quickly to take advantage of all the functionality in the Burp Suite.
In this course, Web Application Penetration Testing with Burp Suite, you will learn hands-on techniques for attacking web applications and web services using the Burp Suite penetration testing tool. This course is designed to expand your knowledge of the Burp Suite beyond just capturing requests and responses. First, you'll learn about scoping your target application properly. Next, you'll spend some time scanning to trigger potential security vulnerabilities in your target, then digging deep into the results to validate your findings. Finally, you'll wrap up by leaning how to properly report your results to your audience. By the end this course, you'll know how to perform all of these techniques at a comfortable and efficient level to better perform your job as a pen tester.
In this course, Web Application Penetration Testing with Burp Suite, you will learn hands-on techniques for attacking web applications and web services using the Burp Suite penetration testing tool. This course is designed to expand your knowledge of the Burp Suite beyond just capturing requests and responses. First, you'll learn about scoping your target application properly. Next, you'll spend some time scanning to trigger potential security vulnerabilities in your target, then digging deep into the results to validate your findings. Finally, you'll wrap up by leaning how to properly report your results to your audience. By the end this course, you'll know how to perform all of these techniques at a comfortable and efficient level to better perform your job as a pen tester.
Syllabus
- Course Overview 1min
- Setting up Your Burp Suite Environment 40mins
- Spidering Your Web Application 34mins
- Scanning Your Web Application 29mins
- Digging Deeper into Your Results 29mins
- Documenting Your Findings 11mins
Taught by
Dr. Sunny Wear
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent