By the end of this video lecture, you should be able to:
Describe web applications
Explain web application vulnerabilities
Describe the tools used to attack web servers