From the course: Introduction to Pen Testing for Cybersecurity Professionals
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Testing the website
From the course: Introduction to Pen Testing for Cybersecurity Professionals
Testing the website
- [Instructor] A major breach because of a vulnerable website has many implications including the potential for a complete loss or compromised sensitive data. In this segment, learn what's involved when testing the website. Organizations put security measures in place to prevent unauthorized individuals from gaining access to network resources, such as the corporate database, which holds data on the organization, operations, and the strategic plan. During the kickoff meeting, ask the stakeholders to help you identify what data would cause the greatest impact if compromised. In other words, what breach would cause your company to be an opening segment of CNN because of a major data leak? And then once identified, focus efforts to test that data. Application testing should include input validation of form information along with common vulnerabilities, such as cross-site scripting, SQL injection and buffer overflow attacks.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Checking physical security3m 44s
-
(Locked)
Identifying wireless vulnerabilities3m 48s
-
(Locked)
Testing the website3m 24s
-
(Locked)
Leaking data via email or VoIP3m 36s
-
(Locked)
Safeguarding cloud services3m 56s
-
(Locked)
Assessing the mobile infrastructure2m 40s
-
(Locked)
Hacking the human3m 25s
-
(Locked)
-
-