Join us for Wild West Hackin’ Fest Deadwood virtual conference! Register Here

Professionally Evil Application Security: Mastering Application Reconnaissance and Mapping with Kevin Johnson

Course Authored by .

As part of the Professionally Evil Application Security series, this course focuses on the crucial aspects of reconnaissance and mapping within the application penetration testing methodology.

Course Length: 4 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

As part of the Professionally Evil Application Security series, this course focuses on the crucial aspects of reconnaissance and mapping within the application penetration testing methodology.

Embark on a journey into the world of web security with Mastering Application Reconnaissance and Mapping. Whether you’re a seasoned professional or a curious newcomer, this course will equip you with the foundational knowledge and practical skills to assess web applications against potential vulnerabilities.

The adventure begins with a comprehensive introduction, preparing you for the exciting challenges ahead. Discover how the web works, uncover the nuances of scoping, and delve into the intricacies of hosting services. Understand the limitations that applications face, and explore the various tools used to assess and enhance their security.

In the reconnaissance section, learn the art of information gathering as it pertains to web applications. Navigate through diverse application types, grasp the significance of sensitive data exposure, and acquire valuable insights into mapping techniques. Uncover hidden vulnerabilities and understand how HTTP, content-security policies, origin policies, cookies, and APIs impact the security landscape.

Our instructors will guide you through each module, providing real-world examples and practical exercises in a test lab. Sharpen your skills, target your class objectives, and gain hands-on experience to develop a robust security mindset.

Join us on this casual yet professional learning journey and unlock the secrets of web security. Enroll in “Mastering Application Reconnaissance and Mapping” today to become a proficient application security professional and stay one step ahead of emerging threats. Check out our other Secure Ideas courses here.

System Requirements
  • Student Requirements
    • All students attending the training will need a laptop and virtualization software, such as Virtual Box or Hyper-V, installed and ready to use. Virtual Machines will require at least 8GB of RAM and 40GB of hard drive space available.

FAQ

Key Takeaways
• Provide a fundamental understanding of application penetration testing processes
• Gain a foundational understanding of common application pentesting tools
• Understand how to interact with applications to discover potential security vulnerabilities
• How validate findings and exploit common vulnerabilities
• How to effectively report on discovered vulnerabilities
Who Should Take This Course
• Penetration Testers
• IT Professional
• Developers
• Students
What Each Student Will Be Provided With
Each student will receive a PDF of the course material and virtual machine image.

About the Instructor

Pixel splash background
Kevin Johnson
Kevin Johnson
"Professionally Evil"
Bio

Kevin Johnson is CEO of Secure Ideas, a consulting company dedicated to security testing and training. Kevin passionately advocates for cybersecurity through his work with Secure Ideas, as a global board member for OWASP and as a faculty member at IANS. During his over 30 years in the industry, Kevin acted as an instructor and author for the SANS institute.

Shopping Cart

No products in the cart.