Course Introduction
This course introduces the participants to:
- Understand Vulnerability Assessment with IAST Technology
- Setup the environment for Vulnerability Assessment
- Best practices
- Built in Exploits
- Vulnerability Management
- Integration with CICD and DevSecOps.
- New Features in Netsparker
Participant will have the opportunity to obtain the following:
- Live Training and Q&A
- Security Best Practices and Consulting
- Multiple use cases i.e, REST API SCANNING, CAPTCHA based scanning
Pre-Requisites
- Basic Knowledge of Network and Firewalls
- Basic Knowledge of OWASP Top 10
- Valid Subscription
Target Audience
- IT Managers
- IT Admin
- Infra Team
- SOC Team
Course Outline
Overview of Netsparker and Web Vulnerability Scanning
-
Scope of engagement
-
Netsparker IAST
-
Netsparker HAWK OOB Detection
-
Scan Settings
-
Scanning/Crawling Options
-
Login Sequence
-
Site Crawler
-
Information gathering
-
Vulnerability identification
-
REST API Scanning
-
Web Vulnerability Scanning
-
Compare Results to highlight the differences between the scans
-
Scheduling scans for future or recurrent scans for periodical reporting
-
Reporting – Developer, Executive and comprehensive reporting
-
Compliance Reports
-
Integrations
-
Reporting
Request for a Training Quote with our specialist today