Course Library View the full range of courses
Accounting (92 courses)
Employability (850 courses)
Health and Social Care (129 courses)
IT & Software (100 courses)
Language (58 courses)
Management (346 courses)
Personal Development (1318 courses)
Teach & Education (99 courses)
Unit 01: Introduction | |||
About The Course | 00:03:00 | ||
Unit 02: BE PREPARED | |||
Web Attack Simulation Lab | 00:12:00 | ||
Unit 03: WEB APPLICATION TECHNOLOGIES | |||
Web application technologies 101 – PDF | 01:34:00 | ||
HTTP Protocol Basics | 00:11:00 | ||
Encoding Schemes | 00:13:00 | ||
Same Origin Policy – SOP | 00:06:00 | ||
HTTP Cookies | 00:11:00 | ||
Cross-origin resource sharing | 00:05:00 | ||
Web application proxy – Burp suite | 00:09:00 | ||
Unit 04: INFORMATION GATHERING - MAPPING THE APPLICATIONS | |||
Fingerprinting web server | 00:05:00 | ||
DNS Analysis – Enumerating subdomains | 00:04:00 | ||
Metasploit for web application attacks | 00:12:00 | ||
Web technologies analysis in real time | 00:03:00 | ||
Outdated web application to server takeover | 00:08:00 | ||
BruteForcing Web applications | 00:06:00 | ||
Shodan HQ | 00:07:00 | ||
Harvesting the data | 00:05:00 | ||
Finding link of target with Maltego CE | 00:09:00 | ||
Unit 05: CROSS-SITE SCRIPTING ATTACKS – XSS | |||
Cross Site Scripting- XSS – PDF | 01:08:00 | ||
Cross site scripting | 00:07:00 | ||
Reflected XSS | 00:14:00 | ||
Persistent XSS | 00:11:00 | ||
DOM-based XSS | 00:10:00 | ||
Website defacement through XSS | 00:09:00 | ||
XML Documents & database | 00:14:00 | ||
Generating XSS attack payloads | 00:13:00 | ||
XSS in PHP, ASP & JS Code review | 00:13:00 | ||
Cookie stealing through XSS | 00:12:00 | ||
Advanced XSS phishing attacks | 00:08:00 | ||
Advanced XSS with BeEF attacks | 00:10:00 | ||
Advanced XSS attacks with Burp suite | 00:08:00 | ||
Code Review Guide | 06:20:00 | ||
Unit 06: SQL INJECTION ATTACKS – EXPLOITATIONS | |||
SQL Injection attacks – PDF | 01:30:00 | ||
Introduction to SQL Injection | 00:16:00 | ||
Dangers of SQL Injection | 00:05:00 | ||
Hunting for SQL Injection vulnerabilities | 00:20:00 | ||
In-band SQL Injection attacks | 00:27:00 | ||
Blind SQL Injection attack in-action | 00:10:00 | ||
Exploiting SQL injection – SQLMap | 00:09:00 | ||
Fuzzing for SQL Injection – Burp Intruder | 00:14:00 | ||
Unit 07: CROSS SITE REQUEST FORGERY – XSRF | |||
CSRF or XSRF attack methods | 00:12:00 | ||
Anti-CSRF Token methods | 00:15:00 | ||
Anti-CSRF token stealing-NOT easy | 00:11:00 | ||
Unit 08: AUTHENTICATION & AUTHORIZATION ATTACKS | |||
Authentication bypass-hydra | 00:11:00 | ||
HTTP Verb Tampering | 00:09:00 | ||
HTTP parameter pollution – HPP | 00:06:00 | ||
Authentication | 00:10:00 | ||
Unit 09: CLIENT SIDE SECURITY TESTING | |||
Client side control bypass | 00:10:00 | ||
Unit 10: FILE RELATED VULNERABILITIES | |||
LFI & RFI attacks | 00:13:00 | ||
Unrestricted file upload – content type | 00:06:00 | ||
Unrestricted File Upload – Extension Type | 00:06:00 | ||
Remote code execution using Shell Uploads | 00:09:00 | ||
Unit 11: XML EXTERNAL ENTITY ATTACKS – XXE | |||
XML Documents & database | 00:14:00 | ||
XXE attacks in action | 00:14:00 | ||
Resources | |||
Advance intruder attack types | 00:23:00 | ||
Finding details with open source | 00:17:00 |
No Reviews found for this course.
Can’t find the anwser you’re looking for ? Reach out to customer support team.
There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.
You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.
For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.
Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.
We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.
Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.
If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.