Web Application Pentesting
Rated 3.5/5 based on 11 customer reviews

Web Application Pentesting

Available: Out of Stock
$0.00

Request Info
The Web Application Pentesting skill path teaches you how to discover and exploit vulnerabilities in Web apps. You’ll learn how to use popular penetration testing tools to perform an analysis of Web applications, assess their weaknesses and better defend them from malicious attacks.

Web Application Pentesting Project

Project | 3 hours 18 minutes

Feel like a real bounty hunter while working through the 13 challenging levels of this capture-the-flag (CTF) exercise.

Introduction to Web Application Pentesting

Course | 19 minutes

Begin your pentesting path with this foundational introduction to Web application pentesting, covering common threats, methodologies and more.

Attacking Web Application Access Controls

Course | 27 minutes

Learn to attack web application access controls with this course on attacking access control, attacking authentication, attacking session management and more.

Target Identification and Application Mapping

Course | 54 minutes

Take a closer look at target identification and application mapping with this course covering service identification, core defense mechanisms and more. Includes vocabulary and tools.

Injection Attacks

Course | 19 minutes

Learn what you need to know about injecting code or SQL queries into vulnerable applications in order to circumvent access controls. Includes vocabulary and examples.

Common Attack Methods

Course | 37 minutes

Think like a hacker with this course on common attack methods used for pentesting, including attacking Web services, cross-site scripting and exploiting logic flaws.

The Web Application Pentesting skill path teaches you how to discover and exploit vulnerabilities in Web apps. You’ll learn how to use popular penetration testing tools to perform an analysis of Web applications, assess their weaknesses and better defend them from malicious attacks.

Web Application Pentesting Project

Project | 3 hours 18 minutes

Feel like a real bounty hunter while working through the 13 challenging levels of this capture-the-flag (CTF) exercise.

Introduction to Web Application Pentesting

Course | 19 minutes

Begin your pentesting path with this foundational introduction to Web application pentesting, covering common threats, methodologies and more.

Attacking Web Application Access Controls

Course | 27 minutes

Learn to attack web application access controls with this course on attacking access control, attacking authentication, attacking session management and more.

Target Identification and Application Mapping

Course | 54 minutes

Take a closer look at target identification and application mapping with this course covering service identification, core defense mechanisms and more. Includes vocabulary and tools.

Injection Attacks

Course | 19 minutes

Learn what you need to know about injecting code or SQL queries into vulnerable applications in order to circumvent access controls. Includes vocabulary and examples.

Common Attack Methods

Course | 37 minutes

Think like a hacker with this course on common attack methods used for pentesting, including attacking Web services, cross-site scripting and exploiting logic flaws.