Hacking Web Applications The Art of Hacking Series LiveLessons: Security Penetration Testing for Today's DevOps and Cloud Environments

Hacking Web Applications (The Art of Hacking Series) LiveLessons provides step-by-step, real-life scenarios for performing security assessments (penetration testing) through web application vulnerabilities.

Hacking Web Applications The Art of Hacking Series LiveLessons: Security Penetration Testing for Today’s DevOps and Cloud Environments

Course Description

This course from Pearson shows you how to set up a penetration testing lab for web app pen testing where you will learn how to perform reconnaissance and profiling. After these initial steps, you will learn to exploit many vulnerabilities including authentication, session management, injection-based, cross-site scripting, cross-site request forgery, and cryptographic implementations. You will also learn how to assess and perform application programming interface (API) attacks, client-side attacks, and additional web application vulnerability attacks. The primary objective of this course is not to perform malicious attacks, but rather to provide you with step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment as it pertains to web applications. Through the skills explored thr... Read More »

This course from Pearson shows you how to set up a penetration testing lab for web app pen testing where you will learn how to perform reconnaissance and profiling. After these initial steps, you will learn to exploit many vulnerabilities including authentication, session management, injection-based, cross-site scripting, cross-site request forgery, and cryptographic implementations. You will also learn how to assess and perform application programming interface (API) attacks, client-side attacks, and additional web application vulnerability attacks.

The primary objective of this course is not to perform malicious attacks, but rather to provide you with step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment as it pertains to web applications. Through the skills explored throughout the course lessons, you will learn the various concepts associated with many different leading-edge offensive security skills in the industry. The course is full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, and cyber security veteran Omar Santos provides critical information for anyone interested in pursuing an ethical hacking career or simply keeping abreast of evolving threats to keep the web applications of your or your clients’ networks secure from vulnerabilities.

What you will learn:

  • Assess everything you need to know to perform ethical hacking and penetration testing on web applications
  • Understand web application protocols, HTTP Request/Response, session management and cookies, DevOps, cloud services, web application frameworks, and Docker containers to better assess web application vulnerabilities
  • Build your own web application lab for penetration testing
  • Profile and perform passive and active reconnaissance on web applications through several techniques and applications
  • Exploit authentication and session management responsibilities
  • Exploit and mitigate injection-based command, SQL, and XML vulnerabilities
  • Exploit and mitigate Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities
  • Exploit and mitigate cryptographic vulnerabilities
  • Understand and test APIs to mitigate web application attacks
  • Understand and mitigate client-side, HTML5, and AJAX vulnerabilities
  • Examine additional avenues where you can exploit (and protect) web application vulnerabilities
Read Less
Course Details:

Target Audience

  • Any network or security professional who is starting a career in ethical hacking and penetration testing
  • Individuals preparing for the Offensive Security Certified Professional (OSCP), the Certified Ethical Hacker (CEH), CompTIA PentTest+, or any other ethical hacking certification.
  • Any cyber security professional who wants to learn the skills required to become a professional ethical hacker and wants to learn more about web application hacking methodologies and attacks

Prerequisites

  • This course requires you to have basic knowledge of networking and cybersecurity concepts and technologies
Certificate Info:

Type of Certification

Certificate of Completion

Format of Certification

Digital and Print

Professional Association/Affiliation

This certificate is issued by Pearson LearnIT

Method of Obtaining Certification

Upon successful completion of the course, participants will receive a certificate of completion.

Course Outline

  • Hacking Web Applications The Art of Hacking Series LiveLessons: Security Penetration Testing for Today's DevOps and Cloud Environments: Introduction
“Introduction to Web Application Penetration Testing,” reviews ethical hacking and penetration testing basics before moving on to pen testing methodologies, surveying the evolution of web applications, and reviewing the programming languages you need to know to perform web application hacking.
  • Learning objectives
  • 1.1 Understanding Ethical Hacking and Penetration Testing
  • 1.2 Surveying Web Application Penetration Testing Methodologies
  • 1.3 Understanding the Need for Web Application Penetration Testing
  • 1.4 Exploring How Web Applications Have Evolved Over Time
  • 1.5 Exploring What Programming Languages You Should Know
“Overview of Web Applications for Security Professionals,” reviews the different web application protocols before deep diving into HTTP Request/Response, session management, and cookies. The second half of this lesson looks at cloud services, web application frameworks, docker containers, and Kubernetes.
  • Learning objectives
  • 2.1 Understanding the Web Application Protocols
  • 2.2 Exploring the HTTP Request and Response
  • 2.3 Surveying Session Management and Cookies
  • 2.4 Introducing DevOps
  • 2.5 Exploring Cloud Services
  • 2.6 Exploring Web Application Frameworks
  • 2.7 Surveying Docker Containers
  • 2.8 Introducing Kubernetes
Build Your Own Web Application Lab,” covers how to build your own web application lab environment for penetration testing via Kali Linux. You will also learn about web app vulnerabilities and how to hack them using DVWA, WebGoat, Hackazon, and Web Security Dojo. The lesson concludes with a look at web application proxies, cyber ranges, and capture the flag events to enhance your web app hacking skills in a safe environment.
  • Learning objectives
  • 3.1 Exploring Kali Linux
  • 3.2 Introducing Vulnerable Applications
  • 3.3 Surveying DVWA
  • 3.4 Surveying WebGoat
  • 3.5 Surveying Hackazon
  • 3.6 Exploring the Web Security Dojo
  • 3.7 Understanding Web Application Proxies
  • 3.8 Understanding Cyber Ranges and Capture the Flag Events
Reconnaissance and Profiling Web Applications,” covers the basics of passive and active reconnaissance using search engines, public information, and a variety of other useful utilities. Next, you will also learn about CMS and framework identification before moving on to implementing web crawlers to perform directory brute force attacks. The lesson concludes with a look at how to implement a variety of web application scanners.
  • Learning objectives
  • 4.1 Understanding Passive vs. Active Reconnaissance
  • 4.2 Using Search Engines and Public Information
  • 4.3 Exploring Shodan, Maltego, Recon-NG, SpiderFoot, and TheHarvester
  • 4.4 Exploring CMS and Framework Identification
  • 4.5 Surveying Web Crawlers and Directory Brute Force
  • 4.6 Understanding How Web Application Scanners Work
  • 4.7 Introducing Nikto
  • 4.8 Introducing the Burp Suite
  • 4.9 Introducing OWASP Zed Application Proxy (ZAP)
  • 4.10 Introducing OpenVAS
“Authentication and Session Management Vulnerabilities,” explores web application authentication scheme and session management mechanisms, their related vulnerabilities, and how to exploit and mitigate them.
  • Learning objectives
  • 5.1 Understanding Authentication Schemes in Web Applications and Related Vulnerabilities
  • 5.2 Exploring Session Management Mechanisms and Related Vulnerabilities
“Exploiting Injection-Based Vulnerabilities,” covers how to exploit command, SQL, and XML injection-based vulnerabilities, as well as how to mitigate them.
  • Learning objectives
  • 6.1 Understanding Command Injection
  • 6.2 Exploiting Command Injection Vulnerabilities
  • 6.3 Understanding SQL Injection
  • 6.4 Exploiting SQL Injection Vulnerabilities
  • 6.5 Understanding XML Injection
  • 6.6 Exploiting XML Injection Vulnerabilities
  • 6.7 Mitigating Injection Vulnerabilities
"Cross-Site Scripting (XSS) and Cross-Site Request Forgery Vulnerabilities,” reviews Reflected, Stored, and DOM-based XSS vulnerabilities as well as CSRF vulnerabilities. The lesson moves on with a look at evading web application security controls before concluding with details on how to mitigate the XSS and CSRF vulnerabilities covered earlier in the lesson.
  • Learning objectives
  • 7.1 Introducing XSS
  • 7.2 Exploiting Reflected XSS Vulnerabilities
  • 7.3 Exploiting Stored XSS Vulnerabilities
  • 7.4 Exploiting DOM-based XSS Vulnerabilities
  • 7.5 Understanding Cross-Site Request Forgery (CSRF)
  • 7.6 Exploiting CSRF Vulnerabilities
  • 7.7 Evading Web Application Security Controls
  • 7.8 Mitigating XSS and CSRF Vulnerabilities
“Exploiting Weak Cryptographic Implementations,” reviews the basics of cryptography, encryption, and hashing protocols before moving on to how identify common flaws in data storage and transmission. Armed with these fundamentals, you will learn how to identify, exploit, and mitigate crypto-based attacks and vulnerabilities.
  • Learning objectives
  • 8.1 Introducing Cryptography, Encryption, and Hashing Protocols
  • 8.2 Identifying Common Flaws in Data Storage and Transmission
  • 8.3 Surveying Examples of Crypto-based Attacks and Vulnerabilities
  • 8.4 Mitigating Flaws in Cryptographic Implementations
“Attacking Application Programming Interfaces (APIs),” provides you with an understand of APIs as well as a look at some tools used to test APIs in pen testing.
  • Learning objectives
  • 9.1 Understanding the APIs
  • 9.2 Exploring the Tools Used to Test the APIs
“Client-side Attacks,” reviews client-side code and storage before exploring how to identify and mitigate HTML5, AJAX, and other client-side implementation vulnerabilities.
  • Learning objectives
  • 10.1 Surveying the Client-side Code and Storage
  • 10.2 Understanding HTML5 Implementations
  • 10.3 Understanding AJAX Implementations
  • 10.4 Mitigating AJAX, HTML5, and Client-side Vulnerabilities
“Additional Web Application Security Vulnerabilities and Attacks,” concludes the course with a review of some common web application security flaws including insecure direct object references, path traversal, and information disclosure. You will also learn the basics of web application fuzzing.
  • Learning objectives
  • 11.1 Understanding the Other Common Security Flaws in Web Applications
  • 11.2 Exploiting Insecure Direct Object References and Path Traversal
  • 11.3 Surveying Information Disclosure Vulnerabilities
  • 11.4 Fuzzing Web Applications
  • Summary

DON'T HAVE TIME?

We can send you everything you need to know about this course through email.
We respect your privacy. Your information is safe and will never be shared.