TST 355 - Penetration Testing for Authorization Vulnerabilities
Authorization is the process of enforcing policies; determining what types of qualities of activities, resources, or services a user is permitted. Authorization vulnerabilities include forceful browsing and privilege escalation. This course teaches how to identify, test, and exploit these vulnerabilities.
After completing this course, you will be able to:
- Identify common authorization vulnerabilities
- Test application access controls
- Exploit authorization vulnerabilities
Looking To Learn More?
Request more information on our courses and labs.