Professionally Evil Application Security: Mastering Application Reconnaissance and Mapping with Kevin Johnson
Overview
- Course Length: 4 hours
- Support from expert instructors
- Includes a certificate of completion
As part of the Professionally Evil Application Security series, this course focuses on the crucial aspects of reconnaissance and mapping within the application penetration testing methodology.
Embark on a journey into the world of web security with Mastering Application Reconnaissance and Mapping. Whether you’re a seasoned professional or a curious newcomer, this course will equip you with the foundational knowledge and practical skills to assess web applications against potential vulnerabilities.
The adventure begins with a comprehensive introduction, preparing you for the exciting challenges ahead. Discover how the web works, uncover the nuances of scoping, and delve into the intricacies of hosting services. Understand the limitations that applications face, and explore the various tools used to assess and enhance their security.
In the reconnaissance section, learn the art of information gathering as it pertains to web applications. Navigate through diverse application types, grasp the significance of sensitive data exposure, and acquire valuable insights into mapping techniques. Uncover hidden vulnerabilities and understand how HTTP, content-security policies, origin policies, cookies, and APIs impact the security landscape.
Our instructors will guide you through each module, providing real-world examples and practical exercises in a test lab. Sharpen your skills, target your class objectives, and gain hands-on experience to develop a robust security mindset.
Join us on this casual yet professional learning journey and unlock the secrets of web security. Enroll in “Mastering Application Reconnaissance and Mapping” today to become a proficient application security professional and stay one step ahead of emerging threats.
Key Takeaways
- Provide a fundamental understanding of application penetration testing processes
- Gain a foundational understanding of common application pentesting tools
- Understand how to interact with applications to discover potential security vulnerabilities
- How validate findings and exploit common vulnerabilities
- How to effectively report on discovered vulnerabilities
Who Should Take This Course
- Penetration Testers
- IT Professional
- Developers
- Students
What Each Student Will Be Provided With
Each student will receive a PDF of the course material and virtual machine image.
All students attending the training will need a laptop and virtualization software, such as Virtual Box or Hyper-V, installed and ready to use. Virtual Machines will require at least 8GB of RAM and 40GB of hard drive space available.
There are no scheduled live dates for this course at this time. Private training may be available.