Web Application Hacking
4.3 (24 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
205 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Web Application Hacking to your Wishlist.

Add to Wishlist

Web Application Hacking

Learn the art of Application Hacking to safeguard your application from being hacked. Build to be an Ethical Hacker!!
4.3 (24 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
205 students enrolled
Last updated 1/2015
English
Current price: $10 Original price: $20 Discount: 50% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 8.5 hours on-demand video
  • 3 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
The Students will be able test/identify security vulnerabilities in their application and take appropriate decisions to safeguard their applications
View Curriculum
Requirements
  • The Students need to have basic knowledge of web applications.
Description


This is an excellent course on learning the art of Web Application Hacking a.k.a Web Application Penetration testing (WAPT). It focuses on preparing the students /developers /auditors to face the real world of Web Application Penetration testing while helping them safeguard their company's applications, data and reputation.

This Course starts from teaching you the basics of any attack and then moving onto substantiating it with pure technical skills. It is designed to cover all the latest attacks of Web Application like Web Attacks, Web Services, Flash Attacks, Injection attacks and many more at an affordable price for all the ethical hacking enthusiasts.

The highlights of this course include:

  • Learning the basic of Web Application Hacking
  • Learning how to exploit and defend real-world web apps
  • Learning to setup your own vulnerable test application for learning to hack and crack
  • Understanding concepts with beautiful diagrams, illustrations and demonstrations
  • Tracking your progress with the tricky quizzes

Be Safe Keep Safe!!

Who is the target audience?
  • This course is for Students looking to build a successful career in Ethical Hacking.
  • This course is for developers looking to safeguard their applications.
  • This is also for the security auditors who have to audit the application from security perspective
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 49 Lectures Collapse All 49 Lectures 08:39:06
+
Introduction
4 Lectures 01:01:59

Web Application Information Gathering
14:03

Basics of HTTP Request / Response
15:22

Introduction to BURP Suite Proxy Tool
15:37

Quiz - Introduction to HTTP
3 questions
+
Setting up Sample Test Application
2 Lectures 00:00
DVWA Application Installation Guide
6 pages

Installation of Mutillidae II application
6 pages
+
Introduction to Web Application Session Management
2 Lectures 24:59
Web Application Cookies
14:02

Web Session Management attacks
10:57

Session Management
3 questions
+
Clickjacking Attacks
2 Lectures 15:24
Introduction to Clickjacking Attacks
10:28

Testing for Clickjacking Attacks
04:56

Quiz - Clickjacking
1 question
+
Cross Site Scripting Attacks
5 Lectures 39:55

Reflected Cross Site Scripting
05:43

Stored Cross Site Scripting
02:59

Mitigating Cross Site Scripting Attacks
08:48

DOM Based Cross Site Scripting Attack
09:57

Quiz - Cross Site Scripting
2 questions
+
Flash Based Attacks
8 Lectures 58:17
Introduction to Flash Applications
07:52

Setting up a Vulnerable Flash application
2 pages

De-compiling Flash Applications
10:13

Cross Site Scripting in Flash Applications
05:31

Cross Site Flashing in Flash Applications
07:30

HTML Injection in Flash Applications
11:19

Phishing Attacks through Flash Applications
10:31

Impact Analysis & Mitigating Flash Attacks
05:21
+
XPath Injection Attacks
2 Lectures 34:29
XPATH Basics
15:55

XPATH Injection
18:34
+
XSLT Injection
2 Lectures 25:26
XSLT Basics
07:30

XSLT Injection
17:56
+
XML Attacks
4 Lectures 28:59
XML Basics
09:23

XML CDATA Injection
03:56

XML External Entity Injection
07:04

XML Entity Expansion Attack
08:36

Quiz - XML Injection
2 questions
+
Web Service Attacks
7 Lectures 56:30
Web Service Basics
11:40

Web Services Attacks
06:51

Web Service Clients Tutorial
13:50

Web Services - SQL Injection
06:33

Web Services - Command Injection
06:23

Web Service - SOAP Array DOS Attack
04:16

Web Service - SOAPAction Header Manipulation Attack
06:57
3 More Sections
About the Instructor
Manjunath Venkatraman
4.3 Average rating
24 Reviews
205 Students
1 Course
Trainer for IT and System Audits

I have 10+ years of experience in carrying out system audit, process audit, access control, risk analysis and Training. Conducted multiple training programme for teams involved in IT enabled services implementation in large organisation. I have contributed to development of training material , process documentation and implementation of measures and system checks to plug security risks.

With my experience in working on IT Risk assessment and mitigation, and realizing the urgent need for creating expertise in the field of application security, vulnerability testing and ethical hacking, these training modules have been designed . I have worked closely with vastly experienced professionals working in large size MNC IT companies to develop these modules. Both amateurs and professions seeking to gain expertise in these fields will find these modules quite interesting, informative and educative.