Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Lynda - Ethical Hacking: Website and Web Application Testing

Posted By: U.N.Owen
Lynda - Ethical Hacking: Website and Web Application Testing

Lynda - Ethical Hacking: Website and Web Application Testing
Size: 289 MB | Duration: 1h 35m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

Websites and web applications are—by their very nature—accessible remotely, which puts them at high risk of cyber attack. Knowing how to prevent and detect web attacks is a critical skill for developers and information security professionals alike. Find out how to test your sites and applications for weaknesses in this course with cybersecurity expert Malcolm Shore. Malcolm examines the various parts of a web application (focusing on the most vulnerable components), and introduces the Open Web Application Security Project (OWASP), which provides documentation, tools, and forums for web developers and testers. Malcolm also provides an overview of popular testing tools, including Burp Suite, Vega, and WebScarab. Learn how to use these utilities to run basic and advanced tests, and shore up sites against common attacks, such as SQL injections and cross-site scripting exploits. The course closes with some resources for practicing your skills, including testing sites such as Trustwave CrackMe Bank and Google Gruyere. Note: The topics in this course will prepare you for key objectives on the Certified Ethical Hacker exam. Find an overview of the certification and the exam handbook at https://www. eccouncil. org/programs/certified-ethical-hacker-ceh/.

* Dissecting HTTP/HTTPS protocol
* Working with WebSockets
* Understanding cookies
* Installing testing tools such as Hacme Casino and the Vega Scanner
* Running web application tests
* Practicing your skills


Lynda - Ethical Hacking: Website and Web Application Testing

No mirrors below please.