Web application Penetration testing & Security
Hunting bugs in Web applications from security perspective - Web application security tester - Beginner to Advanced
Course Description
This is highly practical and hands-on training for Web application penetration testing that covers the OWASP top 10 vulnerabilities to attack and secure.
Combining the most advanced techniques used by offensive hackers to exploit and secure.
[+] Course at a glance
- Starting with various terminologies of web technologies such as, HTTP cookies, CORS, Same-origin-policy etc and ends with multiple resources.
- Once you get sufficient insights of web technologies, the second module covers the, Mapping of application for insecurities, with various tools and tricks with heavy usage of most advanced intercepting proxy "Burp Suite".
- Mostly focused over serious vulnerabilities such as SQL Injection, Cross-site scripting, Cross-site request forgery, XML External Entity (XXE) attacks, Remote command Execution, Identifying load balancers, Metasploit for web applications, Advanced phishing attacks through XSS and more..
[+] Training Methodology
Every lesson starts with Finding and hunting for vulnerability by taking the points how developers make and secure the web application at the time of development, once we have the clear path of working of development phase to security, then we hunt for application business logics to attack. This is where most penetration testers failed in their own game.
"If i need to chop down a tree in six hours, i will use four hours to sharpen my axe and rest 2 hours to cut the tree"
The same strategy has been covered in this course. we start with getting around of web applications by making analysis of application and watching the working behavior of the same.
Goals
What will you learn in this course:
Assess Web applications insecurities
Audit OWASP Top 10
Penetrate web applications
Perform web security audits
Perform bug hunting
Burp suite advanced
Analysing web apps with Burp suite
Be a Web app hacker!
Prerequisites
What are the prerequisites for this course?
Basic knowledge of JavaScript and HTML

Curriculum
Check out the detailed breakdown of what’s inside the course
BE PREPARED!
1 Lectures
-
Web attack simulation Lab 11:38 11:38
WEB APPLICATION TECHNOLOGIES 101
6 Lectures

MAPPING THE APPLICATIONS
10 Lectures

CROSS-SITE SCRIPTING ATTACKS - XSS
13 Lectures

SQL INJECTION ATTACKS - EXPLOITATIONS
7 Lectures

CROSS SITE REQUEST FORGERY - XSRF
3 Lectures

AUTHENTICATION & AUTHORIZATION ATTACKS
3 Lectures

CLIENT SIDE SECURITY TESTING
1 Lectures

FILE RELATED VULNERABILITIES
4 Lectures

XML EXTERNAL ENTITY ATTACKS - XXE
2 Lectures

Course Resources
1 Lectures

Instructor Details

Atul Tiwari
Ethical hacker | Security Evangelist | Penetration TesterSecurity Analyst | IT AUDITOR | Cyber laws expert | Author | Public speaker | CISSP
Having more than 10 years of working experience in information security field.
Have trained more than 90k students on the topic of Information security & penetration testing in classroom mode and online across 168 countries. with expertise in web application penetration testing, I have performed several penetration tests and security audits, security analysis with private, governments and security agencies to help assist with to cope with cyber threats.
Course Certificate
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

Our students work
with the Best


































Feedbacks
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now