Identifying Areas of HTML5 Vulnerability

How to identify and assess the most common HTML5 vulnerabilities and methods of HTML5 based attack on web applications.

5 videos  //  59 minutes of training

Course description

This course will teach you the most common types of attack arising from insecure HTML5 code and the methods used by hackers to exploit them.

Course syllabus

Brute ForceDuration: 17:43

The use of brute force to gain unauthorized access to admin areas of a web application.

Script InjectionDuration: 16:22

How hackers can use your HTML5 elements against you by injecting their own scripts.

Denial of Service (DDOS)Duration: 10:12

Preventing legitimate users from accessing your application by flooding your resources with requests.

Data LeaksDuration: 5:33

Potential exposure of data through insecure storage.

Social Engineering for HTML5Duration: 9:09

Methods such as email spoofing and social media scanning used by hackers to find access points within a web application.

Meet the author

Robert Morel

LinkedIn

Robert Morel is a computer science graduate and currently works as a SecOps Engineer. While at university, Robert started his own web development company. His first website was a static HTML site advertising a plumber. His student prices attracted business, and by the end of university, he had a team of five specializing in developing angular single-page applications and training courses.

Most of Robert’s work since then has been within fintech and blockchain. His first role after university involved migrating large financial data sets from legacy silos onto the blockchain, using Java. Working in fintech, he became an expert in developing secure and hardened web applications. Through this, he also became an experienced security researcher and ethical hacker, as well as a fintech author and blogger.

One of Robert’s favorite parts of working in web app security is having the opportunity to work with penetration testers and bug bounty hunters. Managing, assessing and resolving security reports has taught him more than ever about vulnerabilities and exploits. In his spare time, Robert enjoys developing web-scraping applications, practicing the violin and Chinese calligraphy.

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec