
As part of the Professionally Evil Application Security series, this course focuses on the crucial aspects of reconnaissance and mapping within the application penetration testing methodology.
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date:
Description
As part of the Professionally Evil Application Security series, this course focuses on the crucial aspects of reconnaissance and mapping within the application penetration testing methodology.
Embark on a journey into the world of web security with Mastering Application Reconnaissance and Mapping. Whether you’re a seasoned professional or a curious newcomer, this course will equip you with the foundational knowledge and practical skills to assess web applications against potential vulnerabilities.
The adventure begins with a comprehensive introduction, preparing you for the exciting challenges ahead. Discover how the web works, uncover the nuances of scoping, and delve into the intricacies of hosting services. Understand the limitations that applications face, and explore the various tools used to assess and enhance their security.
In the reconnaissance section, learn the art of information gathering as it pertains to web applications. Navigate through diverse application types, grasp the significance of sensitive data exposure, and acquire valuable insights into mapping techniques. Uncover hidden vulnerabilities and understand how HTTP, content-security policies, origin policies, cookies, and APIs impact the security landscape.
Our instructors will guide you through each module, providing real-world examples and practical exercises in a test lab. Sharpen your skills, target your class objectives, and gain hands-on experience to develop a robust security mindset.
Join us on this casual yet professional learning journey and unlock the secrets of web security. Enroll in “Mastering Application Reconnaissance and Mapping” today to become a proficient application security professional and stay one step ahead of emerging threats. Check out our other Secure Ideas courses here.
System Requirements
-
Student Requirements
- All students attending the training will need a laptop and virtualization software, such as Virtual Box or Hyper-V, installed and ready to use. Virtual Machines will require at least 8GB of RAM and 40GB of hard drive space available.
FAQ
• Gain a foundational understanding of common application pentesting tools
• Understand how to interact with applications to discover potential security vulnerabilities
• How validate findings and exploit common vulnerabilities
• How to effectively report on discovered vulnerabilities
• IT Professional
• Developers
• Students
About the Instructor

Kevin Johnson
"Professionally Evil"Bio
Kevin Johnson is CEO of Secure Ideas, a consulting company dedicated to security testing and training. Kevin passionately advocates for cybersecurity through his work with Secure Ideas, as a global board member for OWASP and as a faculty member at IANS. During his over 30 years in the industry, Kevin acted as an instructor and author for the SANS institute.
Related products
-
Multiple InstructorsLive
Workshop: AI Foundation: Cyber Security Workflow Optimization using AI Technology with Joff Thyer and Derek Banks
View Course -
Multiple InstructorsLive
Workshop: The Hitchhiker’s Guide To Social Engineering with Cameron Cartier
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Assumed Compromise: A Methodology with Detections and Microsoft Sentinel
View Course -
Multiple InstructorsLive
Workshop: Introduction to Cloud Security with Beau Bullock
View Course