Web Application Security Assessment
What you'll learn
This learning path will teach you how to scan your organizations' or beneficiaries' websites for potential vulnerabilities.
Last updated on: 20 August 2024
What you'll learn
This learning path will teach you how to scan your organizations' or beneficiaries' websites for potential vulnerabilities.
Last updated on: 20 August 2024
Modules
Start here
Read the learning path overview, objectives, associated threats, and prerequisites
Module 2
Every web application accepts and processes untrusted input. Here we learn how to discover common vulnerabilities that take advantage thereof
Module 3
Many web apps will only allow particular users to view certain pieces of content and require them to log in or prove their identity in other ways. This subtopic looks into authentication and authorization, and possible vulnerabilities therein
Module 4
There exist other types of vulnerabilities not covered in the above subtopics which could nonetheless be used to damage or gain unauthorized entry into a web app. We look at several of those
Module 5
Once you have learned about different types of vulnerabilities, it's time to look for them in the web applications you are testing! To start with and get some initial practice, you will test a deliberately vulnerable web application
Module 6
Once you’ve figured out the fundamentals of finding vulnerabilities in websites, this subtopic will teach you a process to find those vulnerabilities more quickly and efficiently
Module 7
In past subtopics, we looked at how to discover vulnerabilities by hand. Here, we explore tools that can help automate that process