filmov
tv
Web Application Security and Web Application Hacking | EC-Council
Показать описание
#WebAppSecurity #WebApplicationHacking
EC-Council’s much-anticipated Web Application Hacking and Security certification will provide specialized training in application security. This unique course comes with a web application hacking challenge that provides professionals with real-world cyberattack scenarios.
Candidates will learn
• Advanced Web Application Penetration Testing
• Advanced SQL Injection (SQLi)
• Reflected, Stored and DOM-based Cross Site Scripting (XSS)
• Cross Site Request Forgery (CSRF) – GET and POST Methods
• Server-Side Request Forgery (SSRF)
• Security Misconfigurations
• Directory Browsing/Bruteforcing
• CMS Vulnerability Scanning
• Network Scanning
• Auth Bypass
• Web App Enumeration
• Dictionary Attack
• Insecure Direct Object Reference Prevention (IDOR)
• Broken Access Control
• Local File Inclusion (LFI)
• Remote File Inclusion (RFI)
• Arbitrary File Download
• Arbitrary File Upload
• Using Components with Known Vulnerabilities
• Command Injection
• Remote Code Execution
• File Tampering
• Privilege Escalation
• Log Poisoning
• Weak SSL Ciphers
• Cookie Modification
• Source Code Analysis
• HTTP Header modification
• Session Fixation
• Clickjacking
Learn about application vulnerabilities and web application hacking. Register Now:
EC-Council’s much-anticipated Web Application Hacking and Security certification will provide specialized training in application security. This unique course comes with a web application hacking challenge that provides professionals with real-world cyberattack scenarios.
Candidates will learn
• Advanced Web Application Penetration Testing
• Advanced SQL Injection (SQLi)
• Reflected, Stored and DOM-based Cross Site Scripting (XSS)
• Cross Site Request Forgery (CSRF) – GET and POST Methods
• Server-Side Request Forgery (SSRF)
• Security Misconfigurations
• Directory Browsing/Bruteforcing
• CMS Vulnerability Scanning
• Network Scanning
• Auth Bypass
• Web App Enumeration
• Dictionary Attack
• Insecure Direct Object Reference Prevention (IDOR)
• Broken Access Control
• Local File Inclusion (LFI)
• Remote File Inclusion (RFI)
• Arbitrary File Download
• Arbitrary File Upload
• Using Components with Known Vulnerabilities
• Command Injection
• Remote Code Execution
• File Tampering
• Privilege Escalation
• Log Poisoning
• Weak SSL Ciphers
• Cookie Modification
• Source Code Analysis
• HTTP Header modification
• Session Fixation
• Clickjacking
Learn about application vulnerabilities and web application hacking. Register Now: