fbpx

Hacking MongoDB (NOSQL) training for Pentesters

MongoDB (aka NOSQL) seems a secure database, but there is no security and don’t forget the height of human stupidity. EH Academy announces the MongoDP penetration testing training course.

This course walks users through the basics of how common misconfigurations in MongoDB can lead to serious issues. It provides hands-on practice using the VM provided by the course author. As the title says, this course is intended for absolute beginners. Even if you never used MongoDB, you can still enroll in the course. It starts with the basics of MongoDB and how to use it. Slowly it gears towards the security concepts such as testing and exploiting misconfigurations in MongoDB instances, pentesting web applications that run MongoDB as their back-end, using automated tools available for testing and attacking MongoDB.

Below is the high level table of contents:

Module 1: Introduction

Module 2: Lab Walk-through

Module 3: Basics of Mongo shell

Module 4: Vulnerability Assessments

Module 5: Web based attacks

Module 6: Automated Assessments

Enroll Now!

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...