Packt Publishing – Web Security – Common Vulnerabilities And Their Mitigation

Packt Publishing – Web Security – Common Vulnerabilities And Their Mitigation
English | Size: 9.59 GB
Category: Tutorial

This course will take less than 8 hours of your time, but it is going to save you a lot of time in the future.

Coat your website with armor, protect yourself against the most common threats and vulnerabilities. Understand, with examples, how common security attacks work and how to mitigate them. Learn secure practices to keep your website users safe. Let’s parse that. How do common security attacks work?: This course walks you through an entire range of web application security attacks, XSS, XSRF, Session Hijacking, Direct Object Reference and a whole lot more. How do we mitigate them?: Mitigating security risks is a web developer’s core job. Learn by example how you can prevent script injection, use secure tokens to mitigate XSRF, manage sessions and cookies, sanitize and validate input, manage credentials safely using hashing and encryption etc. What secure practices to follow?: See what modern browsers have to offer for protection and risk mitigation, how you can limit the surface area you expose in your site. [Read more…]

Finding vulnerabilities with Burp suite and using more features

Finding vulnerabilities with Burp suite and using more features
English | Size: 103 MB
Category: Tutorial

This portion of the course covers manually identifying security vulnerabilities with Burp Suite.
[Read more…]

Pluralsight – Threats, Attacks, and Vulnerabilities for CompTIA Security+

Pluralsight – Threats, Attacks, and Vulnerabilities for CompTIA Security+
English | Size: 422.18 MB
Category: Tutorial

This course covers domain one of the CompTIA Security+ certification exam. In this course, Threats, Attacks, and Vulnerabilities for CompTIA Security+, you’ll learn about the various types of threats and attacks every company faces. First, you’ll learn the ins and outs of Malware, ransom-ware, viruses, Trojans, rootkits, social engineering attacks, application vulnerabilities, and DDoS attacks. Next, you’ll also learn the characteristics of the various types of threat actors, the skills they have and the tools they use. Finally, you’ll learn about penetration testing and vulnerability scanning and how they’re used to help tighten security and mitigate potential breaches. By the end of this course, you’ll have a solid understanding of the various threats you’re likely to face and what tools are available to mitigate these threats. [Read more…]

Packt Publishing – Finding and Exploiting Hidden Vulnerabilities

Packt Publishing – Finding and Exploiting Hidden Vulnerabilities
English | Size: 764.89 MB
Category: Tutorial

When learning about penetration testing, vulnerability assessments play an important role, followed by exploiting the vulnerabilities identified. Finally, everything needs to be documented properly to present to the client. This course focuses on all these elements of the VAPT activity.

Courses focused on teaching Vulnerability Assessment and Penetration Testing sometimes miss out on essential elements such as documentation. Keeping this in mind, the course module has been developed to help you understand the process of VAPT step by step. So here you’ll learn how to perform vulnerability assessments using well-known softwares such as Nessus and OpenVas. [Read more…]