Web Application Penetration Testing: Information Gathering

by Malek Mohammad

This course will teach you about web application information gathering which you can use to craft your defenses, since a web application is only as strong as its weakest link.

What you'll learn

How can you prevent attacks if you don't know your enemy? In this course, Web Application Penetration Testing: Information Gathering, you’ll learn to better know how your enemies target you. First, you’ll explore fingerprinting web applications and their building blocks. Next, you’ll discover enumerating those applications and knowing their entry points. Finally, you’ll learn how to use all the needed tools. When you’re finished with this course, you’ll have the skills and knowledge needed to understand how information can be gathered about web targets.

Course FAQ

What is information gathering?

In this course, information gathering means to gather all types of information you can about a specific target in order to better understand the targets strengths and weaknesses.

What is application security software used for?

Application security software is used to develop, test, and optimize security measures with applications to prevent and mitigate security vulerabilities from attackers.

What prerequisites are needed?

The prerequisite for this course is to have an understanding of Linux Command Line.

What will I learn in this information security course?

In this course, you will learn how to identify targets through fingerprinting, discover hidden web applications, how to find leakages, how to enumerate web entry points, and how to map the application architecture. By the end of this course you will know how to do full reconnaissance for your target.

What is Linux Command Line?

Linux command line is a text interface to your computer that allows users to execute commands by manually typing within the terminal.

About the author

Malek Mohammad is an Information Security Consultant and Penetration Tester with previous software development experience. Malek works on making payment applications more secure through Penetration Testing and Threat Modeling. In addition, He helped many software developers in designing their application with security in mind, and not as an afterthought. Malek still has enthusiasm for software development, he uses Python to automate attack scenarios.

Ready to upskill? Get started