Vulnerabilities and Exploits

placeholder

Discover how common threat sources actually get exploited in the world of web security. During this course you will learn about white hat hackers social engineers phishing social engineering attempts exploit kits ransomware state sponsored hacking and bug bounties. See how web-based applications have become more popular and what popularity means for data security. Look at Web Application Firewalls (WAFs) and how they protect web applications. Identify disaster recovery terms such as BCP DRP RTO and RPO. As a review exercise you will describe how malicious users use tools to exploit vulnerabilities.