Hacking Web Applications
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Syllabus
- Introduction
- NordPass Sponsorship
- Course Overview
- The OWASP Top 10
- Installing OWASP Juice Shop
- Installing Foxy Proxy
- Exploring Burp Suite
- Introducing the Score Board
- SQL Injection Overview
- SQL Injection Walkthrough
- SQL Injection Defenses
- Broken Authentication Attacks and Defenses
- Testing for Broken Authentication
- Sensitive Data Exposure Attacks and Defenses
- Testing for Sensitive Data Exposure
- XML External Entities XXE Overview
- XXE Attacks and Defenses
- Broken Access Control Overview
- Broken Access Control Walkthrough
- Security Misconfigurations Overview
- Cross-Site Scripting XSS Overview
- Reflected XSS Walkthrough
- Stored XSS Walkthrough
- Preventing XSS
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging and Monitoring
- Conclusion
Taught by
The Cyber Mentor
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network