Curriculum
- 10 Sections
- 10 Lessons
- 40 Hours
Expand all sectionsCollapse all sections
- Module 1: Web Application Fundamentals1
- Module 2: Web Reconnaissance & Mapping1
- Module 3: Authentication & Session Attacks1
- Module 4: Input Validation & Injection Attacks1
- Database EnumerationReflected, Stored & DOM-based XSS XSS exploitation scenarios Bypassing filters and WAFs Real-world impact & mitigation understanding1
- Module 6: Cross-Site Request Forgery (CSRF)1
- Directory TraversalServer-Side Request Forgery (SSRF) CORS misconfigurations File upload vulnerabilities Business logic flaws1
- XML External Entity (XXE) ProcessingManual testing techniques Intercepting and modifying traffic Fuzzing and payload crafting Understanding tool output vs real vulnerabilities1
- Server-Side Template Injection (SSTI)Writing professional penetration testing reports Risk rating and impact analysis Clear remediation recommendations Executive and technical reporting styles1
- Server-Side Request Forgery (SSRF)1
Master techniques to gather sensitive information about a web application’s database structure and content. Learn how attackers leverage this information to craft targeted attacks. Explore various database enumeration methods and learn to implement countermeasures to protect against them.
Prev
configuration information, or source code. Learn to identify and exploit directory traversal vulnerabilities, and understand how to prevent unauthorized access to restricted areas of a web server.
Next

