Curriculum
- 10 Sections
- 10 Lessons
- 40 Hours
Expand all sectionsCollapse all sections
- Module 1: Web Application Fundamentals1
- Module 2: Web Reconnaissance & Mapping1
- Module 3: Authentication & Session Attacks1
- Module 4: Input Validation & Injection Attacks1
- Database EnumerationReflected, Stored & DOM-based XSS XSS exploitation scenarios Bypassing filters and WAFs Real-world impact & mitigation understanding1
- Module 6: Cross-Site Request Forgery (CSRF)1
- Directory TraversalServer-Side Request Forgery (SSRF) CORS misconfigurations File upload vulnerabilities Business logic flaws1
- XML External Entity (XXE) ProcessingManual testing techniques Intercepting and modifying traffic Fuzzing and payload crafting Understanding tool output vs real vulnerabilities1
- Server-Side Template Injection (SSTI)Writing professional penetration testing reports Risk rating and impact analysis Clear remediation recommendations Executive and technical reporting styles1
- Server-Side Request Forgery (SSRF)1
Dive into the security risks associated with Cross-Origin Resource Sharing (CORS) misconfigurations. Learn how attackers exploit these vulnerabilities to bypass access controls and access sensitive data. Understand how to identify and fix CORS misconfigurations to ensure secure cross-origin communication.
Prev
Learn how to exploit vulnerabilities in web applications that interact with databases, potentially leading to data compromise, unauthorized access, or website defacement. Understand the different types of SQL Injection attacks and the impact they can have on an organization’s security posture. Explore techniques for preventing and mitigating SQL Injection vulnerabilities.
Next

