Hacking Web Applications
Offered By: Cyber Mentor via YouTube
Course Description
Overview
Syllabus
- Introduction
- NordPass Sponsorship
- Course Overview
- The OWASP Top 10
- Installing OWASP Juice Shop
- Installing Foxy Proxy
- Exploring Burp Suite
- Introducing the Score Board
- SQL Injection Overview
- SQL Injection Walkthrough
- SQL Injection Defenses
- Broken Authentication Attacks and Defenses
- Testing for Broken Authentication
- Sensitive Data Exposure Attacks and Defenses
- Testing for Sensitive Data Exposure
- XML External Entities XXE Overview
- XXE Attacks and Defenses
- Broken Access Control Overview
- Broken Access Control Walkthrough
- Security Misconfigurations Overview
- Cross-Site Scripting XSS Overview
- Reflected XSS Walkthrough
- Stored XSS Walkthrough
- Preventing XSS
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging and Monitoring
- Conclusion
Taught by
The Cyber Mentor
Related Courses
Certified Ethical Hacker (CEH) - Linux Academy's Prep CourseA Cloud Guru Advanced Python Scripting for Cybersecurity
Infosec via Coursera Introduction to IT Security
Akamai via Coursera Cyber Comp 1A
Cabrillo College via California Community Colleges System Ethical Hacking
Cabrillo College via California Community Colleges System