Curriculum
- 10 Sections
- 10 Lessons
- 40 Hours
Expand all sectionsCollapse all sections
- Module 1: Web Application Fundamentals1
- Module 2: Web Reconnaissance & Mapping1
- Module 3: Authentication & Session Attacks1
- Module 4: Input Validation & Injection Attacks1
- Database EnumerationReflected, Stored & DOM-based XSS XSS exploitation scenarios Bypassing filters and WAFs Real-world impact & mitigation understanding1
- Module 6: Cross-Site Request Forgery (CSRF)1
- Directory TraversalServer-Side Request Forgery (SSRF) CORS misconfigurations File upload vulnerabilities Business logic flaws1
- XML External Entity (XXE) ProcessingManual testing techniques Intercepting and modifying traffic Fuzzing and payload crafting Understanding tool output vs real vulnerabilities1
- Server-Side Template Injection (SSTI)Writing professional penetration testing reports Risk rating and impact analysis Clear remediation recommendations Executive and technical reporting styles1
- Server-Side Request Forgery (SSRF)1
Gain hands-on experience with industry-standard tools like Burp Suite, OWASP ZAP, and sqlmap, used by web application penetration testers to identify security vulnerabilities, exploit weaknesses, and assess the security posture of web applications.
Prev
Uncover how attackers trick authenticated users into performing unintended actions on web applications. Learn how to identify and exploit CSRF vulnerabilities, and explore practical mitigation techniques to protect against these attacks. Understand the impact of CSRF on user trust and data integrity.
Next

