только у нас скачать шаблон dle скачивать рекомендуем

Фото видео монтаж » Видео уроки » Practical Penetration Testing Skills Hands On Labs

Practical Penetration Testing Skills Hands On Labs

Practical Penetration Testing Skills Hands On Labs

Practical Penetration Testing Skills Hands On Labs
Published 4/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English

| Size: 2.40 GB[/center]
| Duration: 4h 27m
Web Application Penetration test

What you'll learn

Fundamentals of Web Application

Web Application development

Web Application pentesting

Web Application Security

Requirements

No programming experience needed. You will learn everything you need to know

Description

Cybersecurity professionals use a variety of tactics to ensure the safety of sensitive information. Penetration testing is one way they evaluate the computer systems they monitor.Penetration testing is a series of processes and techniques that simulate a real cyberattack. The ultimate goal is to identify security vulnerabilities in an organization's databases, networks, and devices. Penetration tests are carried out by people known as ethical hackers, who understand how real hackers think and what they're after. These ethical hackers may work on staff at a company or as external consultants.To better understand the point of penetration testing, consider this example: An organization deploys a new human resources software that lets remote workers track their work schedule and request time off from home. The organization may hire a penetration tester to ensure this new service doesn't create any unexpected entry points for cyber attackers. This process ultimately helps the organization keep company and customer data secure.Penetration is hacking, but it's authorized hacking. Pen testers receive a signed contract from the client called a statement of work, that outlines what they are allowed to do, and gives them permission to carry out the penetration test. Without authorization, breaking into an organization's environment is illegal.

Overview

Section 1: Introduction

Lecture 1 Introduction

Section 2: Fundamentals of Web Application

Lecture 2 HTTP Pentesting

Lecture 3 Web Application Same Origin

Lecture 4 Web Application Proxies

Section 3: Information Gathering

Lecture 5 Information Gathering Techniques

Lecture 6 Enumerating Resources

Lecture 7 Fingerprint Web Application

Lecture 8 Enumerating Resources

Lecture 9 Finding Hidden Files With Dirbuster

Section 4: Cross Site Scripting

Lecture 10 Reflected XSS and Persistant XSS

Lecture 11 DOM XSS

Lecture 12 BEEF XSS

Section 5: SQL Injections

Lecture 13 SQL Injection Fundamentals

Lecture 14 Testing for SQL Injection

Lecture 15 In-Band SQL Injections

Lecture 16 Error-Based SQL Injection

Lecture 17 Blind SQL Injections

Lecture 18 SQLMap

Section 6: Authentication and Authorization

Lecture 19 Users Enumeration

Lecture 20 Common Vulnerabilities

Section 7: Session Security

Lecture 21 Session attack

Lecture 22 Cross Site Request Forgery (CSRF)

Section 8: Web application attacks

Lecture 23 Flash Vulnerabilities and Security

Lecture 24 CORS Prevention Cheat Sheet

Lecture 25 File Inclusion Vulnerabilities

Lecture 26 Other Attacks

Lecture 27 Web Services

Lecture 28 XPath Injection

Beginner cyber security






Free search engine download: Practical Penetration testing skills hands on labs
Poproshajka




Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.