TST 360 - Penetration Testing for Authentication Vulnerabilities
Building authentication and session management schemes correctly is a difficult task often presenting flaws that may equally difficult to Identify. Common authentication attacks consist of brute force, insufficient authentication, and weak password recovery validation. These types of attacks target and attempt to exploit the authentication process a web site uses to verify the identity of a user, service, or application. This course teaches how to execute attacks, identify vulnerabilities, and verify controls.
After completing this course, you will be able to:
- Identify common authentication vulnerabilities
- Verify authentication controls
- Execute dictionary attacks
Looking To Learn More?
Request more information on our courses and labs.
Course Number: TST 360
Course Duration: 12 minutes
Course CPE Credits: .25
NICE Specialty Areas
Foreign Languages Available: