Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Discover attacks against web apps using weak or broken authentication methods, and how cross-site scripting can be used to execute code. This course will help prepare you for the 312-50: Certified Ethical Hacker v10 exam. Watch these videos and learn how to identify attacks that can exploit weak authentication methods, identify methods to protect against data leaking, recognize the potential dangers of poor encoding practices, identify the types of cross site scripting (XSS) and associated vulnerabilities, recognize potential dangers inherent in running web applications, and mitigate the dangers of using Indirect Object References (IDOR) in web applications.

Expected Duration (hours)
0.9

Lesson Objectives

Certified Ethical Hacker - CEHv10: Common Web App Threats Part 2

  • identify attacks that can exploit weak authentication methods
  • identify methods to protect against data leaking
  • recognize the potential dangers of poor encoding practices
  • Identify the types of cross site scripting (XSS) and associated vulnerabilities
  • Mitigate the dangers of using Indirect Object References (IDOR) in web applications
  • Recognize potential dangers inherent in running web applications
  • Course Number:
    it_spceh10tv_26_04_enus

    Expertise Level
    Intermediate