Attacking Web Applications With Burp Suite

Course Description

Learn to effectively and dynamically attack web applications by discovering security weaknesses and common vulnerabilities using an industry standard methodology backed by the most comprehensive suite of web application penetration testing tools available today. The Burp Suite!

Modern enterprise organizations require stringent application security testing focusing on real world web based attack vectors and application layer threats from all angles. This course was designed by seasoned penetration testers to teach the next generation of information security professionals how to analyze complex web applications and identify security gaps before and after code gets pushed to production.

Learn My Proven Web Penetration Testing Methodology

Discovery & Mapping

Map out your target applications: Pages, Directories, Etc, Identify user-controlled inputs

Focused Penetration

Perform manual and automated fuzzing against all identified parameters and user-controlled inputs

Scanning & Validation

Leverage an automated scanner to test all the things, identify breadth of exposure, and verify results are genuine

Targeted Exploitation

In a controlled manor, exploit discovered attack vectors to further quantify the potential depth of penetration


Capture all evidence screenshots GET/POST data required to generate a detailed report of your findings

You must log in and be a buyer of this download to submit a review.

20 students

Product Details
Release date:2018-03-06
Last updated:2018-03-06
Current version:0.1
Product type:Video Course
File format:mp4
Requirements:Laptop with a dual-core CPU and at least 8Gb RAM + VMware or VirtualBox

Your Cart

  • Your cart is empty.

Copyright 2018


FREE Burp Suite Video

Enter your email address below to preview a video lesson from this course!

Thank you for requesting a free Burp Suite video. You will receive an email with a link to view the video shortly! If you use Gmail make sure to check your Updates and Promotions folder for the video!