CEH v11: Web Application Attacks & Vulnerabilities
Web applications are typically the face of most organizations today. how customers interact with an organizations services which makes for an inviting target for attackers. In this course youll examine the details of web applications including their commonly used technologies associated risks and defenses. Next youll explore the OWASP Top 10 Web Application Attacks document one of the best resources for understanding web application security vulnerabilities and learn how to use common attacks as ethical hackers and protect against them as defenders. Finally youll learn about unvalidated redirects and forwards and how they can be used to access protected data. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v11 (312-50) exam.