Curriculum
- 10 Sections
- 10 Lessons
- 40 Hours
Expand all sectionsCollapse all sections
- Module 1: Web Application Fundamentals1
- Module 2: Web Reconnaissance & Mapping1
- Module 3: Authentication & Session Attacks1
- Module 4: Input Validation & Injection Attacks1
- Database EnumerationReflected, Stored & DOM-based XSS XSS exploitation scenarios Bypassing filters and WAFs Real-world impact & mitigation understanding1
- Module 6: Cross-Site Request Forgery (CSRF)1
- Directory TraversalServer-Side Request Forgery (SSRF) CORS misconfigurations File upload vulnerabilities Business logic flaws1
- XML External Entity (XXE) ProcessingManual testing techniques Intercepting and modifying traffic Fuzzing and payload crafting Understanding tool output vs real vulnerabilities1
- Server-Side Template Injection (SSTI)Writing professional penetration testing reports Risk rating and impact analysis Clear remediation recommendations Executive and technical reporting styles1
- Server-Side Request Forgery (SSRF)1
Learn how to exploit vulnerabilities in web applications that interact with databases, potentially leading to data compromise, unauthorized access, or website defacement. Understand the different types of SQL Injection attacks and the impact they can have on an organization’s security posture. Explore techniques for preventing and mitigating SQL Injection vulnerabilities.
Prev
Explore how attackers manipulate XML processors to access files, execute commands, or perform denial-of-service attacks. Understand the mechanics of XXE attacks and the potential consequences. Learn to secure XML parsers and prevent XXE vulnerabilities in web applications.
Next

