Hacking Web Applications
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Syllabus
- Introduction
- NordPass Sponsorship
- Course Overview
- The OWASP Top 10
- Installing OWASP Juice Shop
- Installing Foxy Proxy
- Exploring Burp Suite
- Introducing the Score Board
- SQL Injection Overview
- SQL Injection Walkthrough
- SQL Injection Defenses
- Broken Authentication Attacks and Defenses
- Testing for Broken Authentication
- Sensitive Data Exposure Attacks and Defenses
- Testing for Sensitive Data Exposure
- XML External Entities XXE Overview
- XXE Attacks and Defenses
- Broken Access Control Overview
- Broken Access Control Walkthrough
- Security Misconfigurations Overview
- Cross-Site Scripting XSS Overview
- Reflected XSS Walkthrough
- Stored XSS Walkthrough
- Preventing XSS
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging and Monitoring
- Conclusion
Taught by
The Cyber Mentor
Related Courses
Complete Website Ethical Hacking and Penetration TestingUdemy Web App Penetration Testing Tutorials
HackerSploit via YouTube Beginner Bug Bounty Course - Web Application Hacking
YouTube Docker for Pentesting & Bug Bounty Hunting
HackerSploit via YouTube Working with Developers for Fun and Progress
OWASP Foundation via YouTube