Upcoming Webinars
In this part, get an introduction to web application security concepts such as testing methodologies, threat modeling, the reconnaissance phase of testing, and some of the most common vulnerabilities that lead to sensitive data exposure, such as: Information Leakage, Fingerprinting, Directory Indexing, and Server/Application Misconfiguration.
Upcoming Webinars
Get an introduction to some of the most critical injection-based vulnerabilities as described in the OWASP top 10 and walkthroughs of how these attacks play out in conjunction with social engineering. Vulnerabilities covered: Improper Input Handling, SQL and XML Injection, Cross Site Scripting, Content Spoofing, and URL Redirector Abuse.
Upcoming Webinars
Get an introduction to how hackers can circumvent access controls and application logic to gain access to sensitive content and functionality. Vulnerabilities covered: Brute Force, Insufficient Authorization/Authentication, Insufficient Session Expiration, Session Prediction, Cross Site Request Forgery, and Insufficient Process Validation.