- Регистрация
- 27 Авг 2018
- Сообщения
- 37,515
- Реакции
- 535,031
- Тема Автор Вы автор данного материала? |
- #1
Pluralsight is not an official partner or accredited training center of EC-Council. Understanding how to detect and identify risks in your web applications is absolutely critical. This course goes through the risks in depth.
Pluralsight is not an official partner or accredited training center of EC-Council. The security profile of web applications is enormously important when it comes to protecting sensitive customer data, financial records, and reputation. Yet, web applications are frequently the target of malicious actors who seek to destroy these things by exploiting vulnerabilities in the software. Most attacks against web applications exploit well known vulnerabilities for which tried and tested defenses are already well-established. Learning these patterns – both those of the attacker and the defender – is essential for building the capabilities required to properly secure applications on the web today. In this course, we'll look a range of different security paradigms within web applications both conceptually and in practice. They'll be broken down into detail, exploited, and then discussed in the context of how the attacks could have been prevented. This course is part of the Ethical Hacking Series. Ethical Hacking (CEH Prep 2018)
About the author
Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.
SALES PAGE:
DOWNLOAD: