Web Application Pentesting Project
Project | 3 hours 18 minutes
Feel like a real bounty hunter while working through the 13 challenging levels of this capture-the-flag (CTF) exercise.
Introduction to Web Application Pentesting
Course | 19 minutes
Begin your pentesting path with this foundational introduction to Web application pentesting, covering common threats, methodologies and more.
Attacking Web Application Access Controls
Course | 27 minutes
Learn to attack web application access controls with this course on attacking access control, attacking authentication, attacking session management and more.
Target Identification and Application Mapping
Course | 54 minutes
Take a closer look at target identification and application mapping with this course covering service identification, core defense mechanisms and more. Includes vocabulary and tools.
Injection Attacks
Course | 19 minutes
Learn what you need to know about injecting code or SQL queries into vulnerable applications in order to circumvent access controls. Includes vocabulary and examples.
Common Attack Methods
Course | 37 minutes
Think like a hacker with this course on common attack methods used for pentesting, including attacking Web services, cross-site scripting and exploiting logic flaws.
Web Application Pentesting Project
Project | 3 hours 18 minutes
Feel like a real bounty hunter while working through the 13 challenging levels of this capture-the-flag (CTF) exercise.
Introduction to Web Application Pentesting
Course | 19 minutes
Begin your pentesting path with this foundational introduction to Web application pentesting, covering common threats, methodologies and more.
Attacking Web Application Access Controls
Course | 27 minutes
Learn to attack web application access controls with this course on attacking access control, attacking authentication, attacking session management and more.
Target Identification and Application Mapping
Course | 54 minutes
Take a closer look at target identification and application mapping with this course covering service identification, core defense mechanisms and more. Includes vocabulary and tools.
Injection Attacks
Course | 19 minutes
Learn what you need to know about injecting code or SQL queries into vulnerable applications in order to circumvent access controls. Includes vocabulary and examples.
Common Attack Methods
Course | 37 minutes
Think like a hacker with this course on common attack methods used for pentesting, including attacking Web services, cross-site scripting and exploiting logic flaws.