Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
This is an excellent course on learning the art of Web Application Hacking a.k.a Web Application Penetration testing (WAPT). It focuses on preparing the students /developers /auditors to face the real world of Web Application Penetration testing while helping them safeguard their company's applications, data and reputation.
This Course starts from teaching you the basics of any attack and then moving onto substantiating it with pure technical skills. It is designed to cover all the latest attacks of Web Application like Web Attacks, Web Services, Flash Attacks, Injection attacks and many more at an affordable price for all the ethical hacking enthusiasts.
The highlights of this course include:
Be Safe Keep Safe!!
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction|
Introduction to Web Application Penetration TestingPreview
Web Application Information Gathering
Basics of HTTP Request / Response
Introduction to BURP Suite Proxy Tool
Quiz - Introduction to HTTP
|Section 2: Setting up Sample Test Application|
DVWA Application Installation Guide
Installation of Mutillidae II application
|Section 3: Introduction to Web Application Session Management|
Web Application Cookies
Web Session Management attacks
|Section 4: Clickjacking Attacks|
Introduction to Clickjacking Attacks
Testing for Clickjacking Attacks
Quiz - Clickjacking
|Section 5: Cross Site Scripting Attacks|
Basics of Cross Site Scripting AttacksPreview
Reflected Cross Site Scripting
Stored Cross Site Scripting
Mitigating Cross Site Scripting Attacks
DOM Based Cross Site Scripting Attack
Quiz - Cross Site Scripting
|Section 6: Flash Based Attacks|
Introduction to Flash Applications
Setting up a Vulnerable Flash application
De-compiling Flash Applications
Cross Site Scripting in Flash Applications
Cross Site Flashing in Flash Applications
HTML Injection in Flash Applications
Phishing Attacks through Flash Applications
Impact Analysis & Mitigating Flash Attacks
|Section 7: XPath Injection Attacks|
|Section 8: XSLT Injection|
|Section 9: XML Attacks|
XML CDATA Injection
XML External Entity Injection
XML Entity Expansion Attack
Quiz - XML Injection
|Section 10: Web Service Attacks|
Web Service Basics
Web Services Attacks
Web Service Clients Tutorial
Web Services - SQL Injection
Web Services - Command Injection
Web Service - SOAP Array DOS Attack
Web Service - SOAPAction Header Manipulation Attack
|Section 11: SQL Injection Attacks|
SQL - Basic Concepts
SQL Injection - Introduction
SQL Injection - Union Based Exploitation
SQL Injection Boolean Based Exploitation
SQL Injection Time Based Exploitation
SQL Injection Mitigation
SQL Injection Quiz
|Section 12: Cross Site Request Forgery (CSRF) Attacks|
Introduction to CSRF Attacks
Testing for CSRF Attacks
Quiz - Cross Site request Forgery
|Section 13: Some Extras!!!!!|
Keyloggers and Virtual Keyboards
File Inclusion Attacks
OS Command Injection
I have 10+ years of experience in carrying out system audit, process audit, access control, risk analysis and Training. Conducted multiple training programme for teams involved in IT enabled services implementation in large organisation. I have contributed to development of training material , process documentation and implementation of measures and system checks to plug security risks.
With my experience in working on IT Risk assessment and mitigation, and realizing the urgent need for creating expertise in the field of application security, vulnerability testing and ethical hacking, these training modules have been designed . I have worked closely with vastly experienced professionals working in large size MNC IT companies to develop these modules. Both amateurs and professions seeking to gain expertise in these fields will find these modules quite interesting, informative and educative.