Whether you are a developer or in security understanding how applications are attacked is the key to defending them. In this course, Web Application Penetration Testing Fundamentals, you'll learn the framework of a successful web application penetration test. First, you'll begin by exploring everything that goes into the pre-engagement, preparing for the test. Next, you'll delve into various techniques for footprinting the application and the underlying servers. Finally, once you lay the groundwork, you'll discover all the common attacks on application inputs and various logic flaws development trams make. By the end of this course, you'll have a solid understanding of the basic framework of web application security assessment, the concepts, and why they are important, so you can relate it back to your own application.
Learning Objectives
- The Principles of Web Application Penetration Testing
- Pre-engagement
- Footprinting
- Attacking User Controls
- Attacking Application Inputs
- Common Attack Methods
- Discovering Logic Flaws
- Reporting
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.