In this course, you'll master the art of web application security testing using Google Hacking techniques. By the end of the course, you'll understand how to leverage Google search to uncover potential vulnerabilities and security risks that can threaten web applications. With an emphasis on real-world scenarios, this course will equip you with the practical skills needed to secure web applications effectively.



Web Application Security Testing with Google Hacking

Instructeur : Packt - Course Instructors
Inclus avec
Expérience recommandée
Ce que vous apprendrez
Master Google Hacking techniques to uncover web vulnerabilities.
Discover how to identify unprotected directory listings and SQL errors.
Learn methods to find sensitive data in URLs and backup files.
Gain practical skills to apply Google Hacking to real-world scenarios like the Microsoft Yammer Social Network.
Détails à connaître

Ajouter à votre profil LinkedIn
avril 2025
8 devoirs
Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées


Obtenez un certificat professionnel
Ajoutez cette qualification à votre profil LinkedIn ou à votre CV
Partagez-le sur les réseaux sociaux et dans votre évaluation de performance

Il y a 11 modules dans ce cours
In this module, we will introduce the core concepts of Google Hacking and its application in web security. You'll gain insight into how search engines can be leveraged to uncover vulnerabilities and the importance of ethical practices in security testing. This section sets the foundation for the techniques and tools used throughout the course.
Inclus
1 vidéo
In this module, we will explore how to use Google search operators to find unprotected directory listings. You'll learn to identify sensitive files that could pose a security threat and discover strategies to protect these directories. This section focuses on the practical application of Google Hacking to uncover and secure vulnerable areas of web applications.
Inclus
1 vidéo1 devoir
In this module, we will dive into using Google search operators to detect SQL syntax errors that could expose web applications to database exploitation. You'll learn to spot these errors in search results and understand how they can be exploited by attackers. This section provides practical skills to identify and prevent SQL injection vulnerabilities effectively.
Inclus
1 vidéo1 devoir
In this module, we will focus on the techniques used to find publicly exposed backup files using Google search operators. You'll understand the security threats these files pose, including potential data breaches, and learn how to protect sensitive data. This section equips you with the skills to identify and secure vulnerable backup files in web applications.
Inclus
1 vidéo1 devoir
In this module, we will teach you how to use Google search operators to detect internal server errors that can expose valuable insights about the inner workings of a web application. You'll learn to identify these errors and understand the security risks they present. This section helps you enhance your ability to protect sensitive server details and avoid potential exploitation.
Inclus
1 vidéo1 devoir
In this module, we will explore how to use Google search techniques to uncover URLs that inadvertently expose sensitive data. You'll learn to spot security risks associated with these URLs and understand the potential consequences. This section provides practical knowledge for securing URLs and protecting sensitive information from being exposed online.
Inclus
1 vidéo1 devoir
In this module, we will teach you how to locate web pages that are still using insecure HTTP, making them vulnerable to various security threats. You'll learn the importance of switching to HTTPS to protect data and prevent attacks. This section equips you with the skills to secure your web applications and ensure safe communication over the internet.
Inclus
1 vidéo1 devoir
In this module, we will guide you through the Google Hacking Database (GHDB), an essential resource for enhancing your Google Hacking techniques. You'll learn how to effectively use the GHDB to uncover vulnerabilities and stay updated on the latest security threats. This section helps you leverage the GHDB to sharpen your web application security testing and improve your overall security strategy.
Inclus
1 vidéo
In this module, we will walk you through a case study analyzing the security of the Microsoft Yammer Social Network. You'll have the opportunity to apply the Google Hacking techniques you've learned in a practical, real-world scenario. This section provides hands-on experience, helping you uncover vulnerabilities and propose solutions to enhance the platform's security.
Inclus
1 vidéo1 devoir
In this module, we will explore techniques to prevent Google from indexing sensitive data, ensuring your digital assets remain protected. You'll learn how to configure settings like "robots.txt" and meta tags to control which pages are indexed. This section helps you maintain privacy and security by managing how your content appears in search engine results.
Inclus
1 vidéo
In this module, we will summarize the critical skills and techniques you've gained throughout the course. You'll reflect on the importance of ethical hacking in web application security and discover resources to continue advancing your expertise. This section ensures you're well-equipped to apply your knowledge and keep enhancing your security practices moving forward.
Inclus
1 vidéo1 devoir
Instructeur

Offert par
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?





Ouvrez de nouvelles portes avec Coursera Plus
Accès illimité à 10,000+ cours de niveau international, projets pratiques et programmes de certification prêts à l'emploi - tous inclus dans votre abonnement.
Faites progresser votre carrière avec un diplôme en ligne
Obtenez un diplôme auprès d’universités de renommée mondiale - 100 % en ligne
Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires
Améliorez les compétences de vos employés pour exceller dans l’économie numérique
Foire Aux Questions
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
Plus de questions
Aide financière disponible,