nice content
Web Application Penetration Online Training
Identify a wide range of web application attacks with self-paced online course
Course Description
Web application penetration testing is the process of finding and exploiting security vulnerabilities in web applications. It is a critical part of ensuring the security of web applications.
Web Application Penetration Online Training Overview
The course deals with penetration testing and security expertise used in the process of identifying various vulnerabilities in web applications. It is crucial to any modern organization. But, if your company does not thoroughly test and secure its web apps, data can be breached disrupting business operations.
Finding security flaws in the complete web application and all of its components (source code, database, back-end network) is the key outcome of web application penetration testing. Web application penetration testing also helps with prioritizing the identified threats and vulnerabilities and potential countermeasures.
This course is perfect for web developers, penetration testers, cyber security specialists, and anybody interested in beginning a career in web pen testing.
Goals
What will you learn in this course:
Understand the basics of web application penetration testing
Find and exploit security vulnerabilities in web applications
Use the latest tools and techniques for web application penetration testing
Follow the ethical hacking methodology
Stay up-to-date on the latest trends in web application security
Prerequisites
What are the prerequisites for this course?
Basic programming skills

Curriculum
Check out the detailed breakdown of what’s inside the course
Web Application Penetration Testing
43 Lectures
-
What is Web Application Penetration Testing? 02:05 02:05
-
Penetration Testing - Overview 03:31 03:31
-
Penetration Testing - Testing Environment Setup 00:48 00:48
-
Penetration Testing - Virtual Box Setup 02:07 02:07
-
Penetration Testing - Kali Linux Setup 11:38 11:38
-
Penetration Testing - Metasploitable Linux 03:34 03:34
-
Penetration Testing - Scanning The Target 12:52 12:52
-
Penetration Testing - Shodan.Io Overview 06:45 06:45
-
Penetration Testing - HTTRACK Overview 04:42 04:42
-
Penetration Testing - NMAP Overview 07:13 07:13
-
Penetration Testing - NMAP Scripting Engine 07:51 07:51
-
Penetration Testing - Metasploit Overview 11:33 11:33
-
Penetration Testing - Wireshark Overview 04:57 04:57
-
Penetration Testing - HTTP Basics 06:09 06:09
-
Penetration Testing - Net Cat Overview 03:47 03:47
-
Penetration Testing - Curl Overview 05:28 05:28
-
Penetration Testing - Burp Suite Overview 09:14 09:14
-
Penetration Testing - Cookies Basics 07:33 07:33
-
Penetration Testing - Sessions Basics 05:29 05:29
-
Penetration Testing - Injection Attacks 06:24 06:24
-
Penetration Testing - Cross Site Scripting 14:52 14:52
-
Penetration Testing - HTML Injection 04:18 04:18
-
Penetration Testing - Command Injections 05:32 05:32
-
Penetration Testing - XXE Injections 06:16 06:16
-
Penetration Testing - X Path Injections 04:42 04:42
-
Penetration Testing - SQL Injection 27:27 27:27
-
Penetration Testing - Login Page SQL Injection 04:47 04:47
-
Penetration Testing - Mongo DB Injection 03:38 03:38
-
Penetration Testing - CSS Injection 04:40 04:40
-
Penetration Testing - Un-Validated Redirects 03:12 03:12
-
Penetration Testing - File Inclusion Vulnerability 01:58 01:58
-
Penetration Testing - Local File Inclusion (LFI) 05:16 05:16
-
Penetration Testing - Remote File Inclusion (RFI) 06:27 06:27
-
Penetration Testing - File Upload Vulnerability 05:02 05:02
-
Penetration Testing - Security Misconfiguration 11:21 11:21
-
Penetration Testing - Path Traversal Attack 05:32 05:32
-
Penetration Testing - Cross Site Request Forgery (CSRF) 07:32 07:32
-
Penetration Testing - Server Side Request Forgery (SSRF) 07:22 07:22
-
Penetration Testing - Buffer Overflow 05:06 05:06
-
Penetration Testing - Insecure Direct Object Reference (IDOB) 09:23 09:23
-
Penetration Testing - Captcha Testing 10:31 10:31
-
Penetration Testing - HTTP Basic Authentication Cracking 14:08 14:08
-
Penetration Testing - Formula Injection 08:03 08:03
Instructor Details

Tutorialspoint
Simply Easy LearningTutorials Point originated from the idea that there exists a class of readers who respond better to online content and prefer to learn new skills at their own pace from the comforts of their drawing rooms.
The journey commenced with a single tutorial on HTML in 2006 and elated by the response it generated, we worked our way to adding fresh tutorials to our repository which now proudly flaunts a wealth of tutorials and allied articles on topics ranging from programming languages to web designing to academics and much more.
40 million readers read 100 million pages every month
Our Text Library Content and resources are freely available and we prefer to keep it that way to encourage our readers acquire as many skills as they would like to. We don't force our readers to sign up with us or submit their details either to use our Free Text Tutorials Library. No preconditions and no impediments, Just Simply Easy Learning!
We have established a Digital Content Marketplace to sell Video Courses and eBooks at a very nominal cost. You will have to register with us to avail these premium services.
Course Certificate
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

Our students work
with the Best


































Feedbacks
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now