Course Introduction
Scenario Overview
Identifying Administrative Tools
Identifying System Vulnerabilities
Demo: Finding Open Ports
Demo: Scanning Your Target
Demo: Probing the Target
Introduction
Identifying Default Configurations
Conclusion
Reviewing System Configurations
Source Code Comments
Demo: Identifying Default Configurations
Intoduction
Demo: Source Code Comments
Assessing Log Configurations
Demo: Automated Testing
Demo: File Extensions
File Extensions
Manual Testing
Demo: Manual Testing
Introduction
Automated Testing
Conclusion
Demo: Searching for Files
Introduction
Searching for Orphaned Files and Directories
Conclusion
Search for Backup Files
Demo: Searching for Orphaned Files and Directories
Demo: Forced Browsing
Demo: Searching through Source Code
Reviewing Documentation and Alternate Ports
Introduction
Forced Browsing
Conclusion
Conclusion
HTTP Method Overview
Introduction
Demo: Identifying Permitted Methods
Cross-domain Policy Files
Conclusion
Introduction
Associated Threats
Demo: Abusing Cross-domain Policy
Introduction
HSTS Overview
Demo: Validating HSTS
Conclusion
Tools, References, and Resources
Certification
You will get a certificate on completing this course.
University
This course is not affiliated with any university.
Price
This course costs very less.
Edvicer's Rewards
You can get a cashback of ₹ 100 on buying this course.
Limited Time Discount Offers
Save your money with Edvicer. Check out our premium courses with discount offers.
Save your money with Edvicer. Check out our premium courses with discount offers.
Map your Career
Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.
Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.
Certification
You will get a certificate on completing this course.
University
This course is not affiliated with any university.
Price
This course costs very less.
Edvicer's Rewards
You can get a cashback of ₹ 100 on buying this course.
This course will teach you how to perform systematic penetration testing of configuration and deployment management using OWASP principles.
Course Overview
Course Introduction
Scenario Overview
Identifying Administrative Tools
Identifying System Vulnerabilities
Demo: Finding Open Ports
Demo: Scanning Your Target
Demo: Probing the Target
Introduction
Identifying Default Configurations
Conclusion
Reviewing System Configurations
Source Code Comments
Demo: Identifying Default Configurations
Intoduction
Demo: Source Code Comments
Assessing Log Configurations
Demo: Automated Testing
Demo: File Extensions
File Extensions
Manual Testing
Demo: Manual Testing
Introduction
Automated Testing
Conclusion
Demo: Searching for Files
Introduction
Searching for Orphaned Files and Directories
Conclusion
Search for Backup Files
Demo: Searching for Orphaned Files and Directories
Demo: Forced Browsing
Demo: Searching through Source Code
Reviewing Documentation and Alternate Ports
Introduction
Forced Browsing
Conclusion
Conclusion
HTTP Method Overview
Introduction
Demo: Identifying Permitted Methods
Cross-domain Policy Files
Conclusion
Introduction
Associated Threats
Demo: Abusing Cross-domain Policy
Introduction
HSTS Overview
Demo: Validating HSTS
Conclusion
Tools, References, and Resources
Write your review of Web Application Penetration Testing: Configuration and Deployment Management Testing
![]() | ![]() | ![]() |
![]() | ![]() | ![]() |
![]() | ![]() | ![]() |