In this course, Web Application Penetration Testing with Burp Suite, you will learn hands-on techniques for attacking web applications and web services using the Burp Suite penetration testing tool. This course is designed to expand your knowledge of the Burp Suite beyond just capturing requests and responses. First, you'll learn about scoping your target application properly. Next, you'll spend some time scanning to trigger potential security vulnerabilities in your target, then digging deep into the results to validate your findings. Finally, you'll wrap up by leaning how to properly report your results to your audience. By the end this course, you'll know how to perform all of these techniques at a comfortable and efficient level to better perform your job as a pen tester.
Sunny Wear, CISSP, GWAPT, GSSP-JAVA, CEH, CSSLP is an Application Security Architect and developer. Her breadth of experience includes network, data, application, and security architecture as well as programming across multiple languages and platforms. In her 20 years of professional experience, she has participated in the design and creation of many enterprise applications as well as the security testing aspects of platforms and services.
Hi everyone, my name is Sunny Wear and welcome to my course Web Application Penetration Testing with Burp Suite. I am a Security Architect and Web Application Penetration Tester at a large Financial Services company.
Did you know that many pen testers today are only using a very small portion of tools available in the Burp Suite product? This course is designed to expand your knowledge of Burp Suite beyond just capturing requests and responses. We will be attacking web applications through a hands-on approach using Burp’s suite of modules as our pentesting tool of choice.
Some of the major topics that we will cover include:
1. Scoping your target application properly
2. Spidering that scope
3. Scanning to trigger potential security vulnerabilities in your target
4. Digging deep into the results to validate our findings
5. Reporting our results to our audience
By the end this course, you’ll know how to perform all of these techniques at a comfortable and efficient level to better perform your job as a pen tester.
Before beginning the course you should be familiar with web technologies and client/server architecture concepts.
I hope you’ll join me on this journey to learn how to be a great web app pentester with the Web Application Penetration Testing with Burp Suite course, at topwallpaper.