The “Web Application Penetration Testing” course is a comprehensive guide to identifying and mitigating vulnerabilities within web applications. Participants will learn the techniques and methodologies used by ethical hackers to assess and secure web applications against cyber threats. Covering topics such as cross-site scripting, SQL injection, authentication attacks, and more, this course equips learners with the knowledge and skills to perform effective penetration testing and enhance web application security.
Learning Outcomes
This Web Application Penetration Testing Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Web Application Penetration Testing Course was made by professionals and it is compatible with all PC’s, Mac’s, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection.
After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8.
Unit 01: INTRODUCTION | |||
About The Course | 00:03:00 | ||
Unit 02: BE PREPARED | |||
Web Attack Simulation Lab | 00:12:00 | ||
Unit 03: WEB APPLICATION TECHNOLOGIES | |||
Web application technologies 101 – PDF | 01:34:00 | ||
HTTP Protocol Basics | 00:11:00 | ||
Encoding Schemes | 00:13:00 | ||
Same Origin Policy – SOP | 00:06:00 | ||
HTTP Cookies | 00:11:00 | ||
Cross-origin resource sharing | 00:05:00 | ||
Web application proxy – Burp suite | 00:09:00 | ||
Unit 04: INFORMATION GATHERING - MAPPING THE APPLICATIONS | |||
Fingerprinting web server | 00:05:00 | ||
DNS Analysis – Enumerating subdomains | 00:04:00 | ||
Metasploit for web application attacks | 00:12:00 | ||
Web technologies analysis in real time | 00:03:00 | ||
Outdated web application to server takeover | 00:08:00 | ||
BruteForcing Web applications | 00:06:00 | ||
Shodan HQ | 00:07:00 | ||
Harvesting the data | 00:05:00 | ||
Finding link of target with Maltego CE | 00:09:00 | ||
Unit 05: CROSS-SITE SCRIPTING ATTACKS – XSS | |||
Cross Site Scripting- XSS – PDF | 01:08:00 | ||
Cross site scripting | 00:07:00 | ||
Reflected XSS | 00:14:00 | ||
Persistent XSS | 00:11:00 | ||
DOM-based XSS | 00:10:00 | ||
Website defacement through XSS | 00:09:00 | ||
XML Documents & database | 00:14:00 | ||
Generating XSS attack payloads | 00:13:00 | ||
XSS in PHP, ASP & JS Code review | 00:13:00 | ||
Cookie stealing through XSS | 00:12:00 | ||
Advanced XSS phishing attacks | 00:08:00 | ||
Advanced XSS with BeEF attacks | 00:10:00 | ||
Advanced XSS attacks with Burp suite | 00:08:00 | ||
Code Review Guide | 06:20:00 | ||
Unit 06: SQL INJECTION ATTACKS – EXPLOITATIONS | |||
SQL Injection attacks – PDF | 01:30:00 | ||
Introduction to SQL Injection | 00:16:00 | ||
Dangers of SQL Injection | 00:05:00 | ||
Hunting for SQL Injection vulnerabilities | 00:20:00 | ||
In-band SQL Injection attacks | 00:27:00 | ||
Blind SQL Injection attack in-action | 00:10:00 | ||
Exploiting SQL injection – SQLMap | 00:09:00 | ||
Fuzzing for SQL Injection – Burp Intruder | 00:14:00 | ||
Unit 07: CROSS SITE REQUEST FORGERY – XSRF | |||
CSRF or XSRF attack methods | 00:12:00 | ||
Anti-CSRF Token methods | 00:15:00 | ||
Anti-CSRF token stealing-NOT easy | 00:11:00 | ||
Unit 08: AUTHENTICATION & AUTHORIZATION ATTACKS | |||
Authentication bypass-hydra | 00:11:00 | ||
HTTP Verb Tampering | 00:09:00 | ||
HTTP parameter pollution – HPP | 00:06:00 | ||
Authentication | 00:10:00 | ||
Unit 09: CLIENT SIDE SECURITY TESTING | |||
Client side control bypass | 00:10:00 | ||
Unit 10: FILE RELATED VULNERABILITIES | |||
LFI & RFI attacks | 00:13:00 | ||
Unrestricted file upload – content type | 00:06:00 | ||
Unrestricted File Upload – Extension Type | 00:06:00 | ||
Remote code execution using Shell Uploads | 00:09:00 | ||
Unit 11: XML EXTERNAL ENTITY ATTACKS – XXE | |||
XML Documents & database | 00:14:00 | ||
XXE attacks in action | 00:14:00 | ||
Resources | |||
Advance intruder attack types | 00:23:00 | ||
Finding details with open source | 00:17:00 | ||
Assignment | |||
Assignment – Web Application Penetration Testing Course | 00:00:00 | ||
Order your Certificate | |||
Order your Certificate5 | 00:00:00 |
Step into the world of seamless content creation with The OBS Course for Recording, your gateway to professional-quality video production. …
0
Delve deeper into the powerful world of Java with Java Mastery Intermediate: Methods, Collections, and Beyond. This course is designed …
0
Take your Java programming skills to new heights with Mastering Advanced Java with Object-Oriented Programming. This course delves deep into …
0