The OWASP Zed Attack Proxy is an open source way of testing your web applications manually. This course walks through the basic functions of ZAP, giving you a look at ways this tool makes taking advantage of web application vulnerabilities possible.
This is a starter course for those jumping into the world of web application security. ZAP is the byproduct of an open source OWASP community project and is used by everyone from those starting out in security, developers, QA testers, to professional penetration testers alike. In this course, Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing, you'll learn the process to run your application through a series of tests. First, you'll start by learning the interface and understanding how ZAP works with the browser. Next, you'll discover how to prepare your environment as you setup for the attack. Then, you'll get walked through some of the manual and automated function of the tool, and how new features of ZAP allow you to pull that functionality into the browser. Finally, you'll explore how to report on what you found. By the end of this course, you'll gain the knowledge to have the confidence to be able to step through an application, and find some opportunities to strengthen the security posture of the software.
Mike is an information security manager who has worked in the IT field for 17+ years. The focus of Mike's career now centers on pentesting and risk assessments. An active member in the infosec community and attends or speaks at various conferences.
Course Overview Hello, everyone. My name is Mike Woolard, and welcome to my course on Getting Started with OWASP Zed Attack Proxy for Web Application Penetration Testing. The Open Web Application Security Project, or OWASP for short, is a free and open community dedicated to securing software. One of the flagship projects is ZAP, Zed Attack Proxy. ZAP is a tool that can be used by security professionals, developers, and quality assurance teams to test for vulnerabilities in applications under development. Inserting scans with ZAP into the SDLC process is the first step towards a stronger and more resilient product. In this course, we're going to cover the interface and understanding how ZAP works with the browser. We're going to learn how to prepare your environment as you set up for the attack. We will walk through some of the manual and automated functions of the tool, and finally, how to report on what you found. This course will give you the knowledge to feel confident. You'll be able to step through an application and find some opportunities to strengthen the security posture of the software. During this course, we're going to talk about some of the more common vulnerabilities found in the web application. A review of the OWASP Top 10 may be beneficial to help you understand why this tool is able to help you discover the various vulnerabilities. I hope you'll join me on this journey as we start the process to learn how to run your application through a series of tests with the Getting Started with OWASP Zed Attack Proxy for Web Application Penetration course, here at Pluralsight.