Booking options
ยฃ25
ยฃ25
On-Demand course
19 hours 38 minutes
All levels
Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step training course. This Web Application Penetration Testing Course has been specially designed to help learners gain a good command of Web Application Penetration Testing Course, providing them with a solid foundation of knowledge to become a qualified professional.
Through this Web Application Penetration Testing Course, you will gain both practical and theoretical understanding of Web Application Penetration Testing Course that will increase your employability in this field, help you stand out from the competition and boost your earning potential in no time.
Not only that, but this training includes up-to-date knowledge and techniques that will ensure you have the most in-demand skills to rise to the top of the industry. This qualification is fully accredited, broken down into several manageable modules, ideal for aspiring professionals.ย
Familiar yourself with the recent development and updates of the relevant industry
Know how to use your theoretical knowledge to adapt in any working environment
Get help from our expert tutors anytime you need
Access to course contents that are designed and prepared by industry professionals
Study at your convenient time and from wherever you want
Affordable premium-quality E-learning content, you can learn at your own pace.
You will receive a completion certificate upon completing the course.
Internationally recognized Accredited Qualification will boost up your resume.
You will learn the researched and proven approach adopted by successful people to transform their careers.
You will be able to incorporate various techniques successfully and understand your customers better.
No formal qualifications required, anyone from any academic background can take this course.
Access to a computer or digital device with internet connectivity.
Unit 01: Introduction | |||
โถ | About The Course | ๐ 00:03:00 | |
Unit 02: BE PREPARED | |||
โถ | Web Attack Simulation Lab | ๐ 00:12:00 | |
Unit 03: WEB APPLICATION TECHNOLOGIES | |||
Web application technologies 101 - PDF | ๐ 01:34:00 | ||
โถ | HTTP Protocol Basics | ๐ 00:11:00 | |
โถ | Encoding Schemes | ๐ 00:13:00 | |
โถ | Same Origin Policy - SOP | ๐ 00:06:00 | |
โถ | HTTP Cookies | ๐ 00:11:00 | |
โถ | Cross-origin resource sharing | ๐ 00:05:00 | |
โถ | Web application proxy - Burp suite | ๐ 00:09:00 | |
Unit 04: INFORMATION GATHERING - MAPPING THE APPLICATIONS | |||
โถ | Fingerprinting web server | ๐ 00:05:00 | |
โถ | DNS Analysis - Enumerating subdomains | ๐ 00:04:00 | |
โถ | Metasploit for web application attacks | ๐ 00:12:00 | |
โถ | Web technologies analysis in real time | ๐ 00:03:00 | |
โถ | Outdated web application to server takeover | ๐ 00:08:00 | |
โถ | BruteForcing Web applications | ๐ 00:06:00 | |
โถ | Shodan HQ | ๐ 00:07:00 | |
โถ | Harvesting the data | ๐ 00:05:00 | |
โถ | Finding link of target with Maltego CE | ๐ 00:09:00 | |
Unit 05: CROSS-SITE SCRIPTING ATTACKS - XSS | |||
Cross Site Scripting- XSS - PDF | ๐ 01:08:00 | ||
โถ | Cross site scripting | ๐ 00:07:00 | |
โถ | Reflected XSS | ๐ 00:14:00 | |
โถ | Persistent XSS | ๐ 00:11:00 | |
โถ | DOM-based XSS | ๐ 00:10:00 | |
โถ | Website defacement through XSS | ๐ 00:09:00 | |
โถ | XML Documents & database | ๐ 00:14:00 | |
โถ | Generating XSS attack payloads | ๐ 00:13:00 | |
โถ | XSS in PHP, ASP & JS Code review | ๐ 00:13:00 | |
โถ | Cookie stealing through XSS | ๐ 00:12:00 | |
โถ | Advanced XSS phishing attacks | ๐ 00:08:00 | |
โถ | Advanced XSS with BeEF attacks | ๐ 00:10:00 | |
โถ | Advanced XSS attacks with Burp suite | ๐ 00:08:00 | |
Code Review Guide | ๐ 06:20:00 | ||
Unit 06: SQL INJECTION ATTACKS - EXPLOITATIONS | |||
SQL Injection attacks - PDF | ๐ 01:30:00 | ||
โถ | Introduction to SQL Injection | ๐ 00:16:00 | |
โถ | Dangers of SQL Injection | ๐ 00:05:00 | |
โถ | Hunting for SQL Injection vulnerabilities | ๐ 00:20:00 | |
โถ | In-band SQL Injection attacks | ๐ 00:27:00 | |
โถ | Blind SQL Injection attack in-action | ๐ 00:10:00 | |
โถ | Exploiting SQL injection - SQLMap | ๐ 00:09:00 | |
โถ | Fuzzing for SQL Injection - Burp Intruder | ๐ 00:14:00 | |
Unit 07: CROSS SITE REQUEST FORGERY - XSRF | |||
โถ | CSRF or XSRF attack methods | ๐ 00:12:00 | |
โถ | Anti-CSRF Token methods | ๐ 00:15:00 | |
โถ | Anti-CSRF token stealing-NOT easy | ๐ 00:11:00 | |
Unit 08: AUTHENTICATION & AUTHORIZATION ATTACKS | |||
โถ | Authentication bypass-hydra | ๐ 00:11:00 | |
โถ | HTTP Verb Tampering | ๐ 00:09:00 | |
โถ | HTTP parameter pollution - HPP | ๐ 00:06:00 | |
Authentication | ๐ 00:10:00 | ||
Unit 09: CLIENT SIDE SECURITY TESTING | |||
โถ | Client side control bypass | ๐ 00:10:00 | |
Unit 10: FILE RELATED VULNERABILITIES | |||
โถ | LFI & RFI attacks | ๐ 00:13:00 | |
โถ | Unrestricted file upload - content type | ๐ 00:06:00 | |
โถ | Unrestricted File Upload - Extension Type | ๐ 00:06:00 | |
โถ | Remote code execution using Shell Uploads | ๐ 00:09:00 | |
Unit 11: XML EXTERNAL ENTITY ATTACKS - XXE | |||
โถ | XML Documents & database | ๐ 00:14:00 | |
โถ | XXE attacks in action | ๐ 00:14:00 | |
Resources | |||
โถ | Advance intruder attack types | ๐ 00:23:00 | |
โถ | Finding details with open source | ๐ 00:17:00 |
Skill Up presents a rigorous online education experience, helping you obtain industry-relevant skills certified by the worldโs...