Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Understanding the target is a critical component of any offensive operation. This course will teach you how to gain a thorough understanding of web applications in order to maximize the potential for vulnerability discovery.
Understanding web applications from a user’s perspective is critical to establishing a foundation for vulnerability discovery. In this course, Web App Pen Testing: Mapping, you’ll learn how to analyze applications from a user's perspective to gain a thorough understanding of why and how applications are built while simultaneously resolving known attack surfaces. First, you’ll learn to create site maps through manual and automated techniques while gaining a functional understanding of applications. Next, you’ll explore techniques for identifying technologies implemented on both the server and client-side of applications. Finally, you’ll learn about architectural design patterns, how they affect the Web App Pen Testing methodology, and how to determine the pattern applied to build an application. When you’re finished with this course, you’ll have the skills and knowledge of Mapping web applications needed to maximize the potential for vulnerability discovery in the next step of the methodology.
Understanding web applications from a user’s perspective is critical to establishing a foundation for vulnerability discovery. In this course, Web App Pen Testing: Mapping, you’ll learn how to analyze applications from a user's perspective to gain a thorough understanding of why and how applications are built while simultaneously resolving known attack surfaces. First, you’ll learn to create site maps through manual and automated techniques while gaining a functional understanding of applications. Next, you’ll explore techniques for identifying technologies implemented on both the server and client-side of applications. Finally, you’ll learn about architectural design patterns, how they affect the Web App Pen Testing methodology, and how to determine the pattern applied to build an application. When you’re finished with this course, you’ll have the skills and knowledge of Mapping web applications needed to maximize the potential for vulnerability discovery in the next step of the methodology.