
We guarantee that all our online courses will meet or exceed your
expectations. If you are not fully satisfied with a course - for
any reason at all - simply request a full refund. We guarantee no
hassles. That's our promise to you.
Go ahead and order with confidence!

| Unit 01: Introduction | |||
| About The Course | |||
| Unit 02: BE PREPARED | |||
| Web Attack Simulation Lab | |||
| Unit 03: WEB APPLICATION TECHNOLOGIES | |||
| Web application technologies 101 – PDF | |||
| HTTP Protocol Basics | |||
| Encoding Schemes | |||
| Same Origin Policy – SOP | |||
| HTTP Cookies | |||
| Cross-origin resource sharing | |||
| Web application proxy – Burp suite | |||
| Unit 04: INFORMATION GATHERING - MAPPING THE APPLICATIONS | |||
| Fingerprinting web server | |||
| DNS Analysis – Enumerating subdomains | |||
| Metasploit for web application attacks | |||
| Web technologies analysis in real time | |||
| Outdated web application to server takeover | |||
| BruteForcing Web applications | |||
| Shodan HQ | |||
| Harvesting the data | |||
| Finding link of target with Maltego CE | |||
| Unit 05: CROSS-SITE SCRIPTING ATTACKS – XSS | |||
| Cross Site Scripting- XSS – PDF | |||
| Cross site scripting | |||
| Reflected XSS | |||
| Persistent XSS | |||
| DOM-based XSS | |||
| Website defacement through XSS | |||
| XML Documents & database | |||
| Generating XSS attack payloads | |||
| XSS in PHP, ASP & JS Code review | |||
| Cookie stealing through XSS | |||
| Advanced XSS phishing attacks | |||
| Advanced XSS with BeEF attacks | |||
| Advanced XSS attacks with Burp suite | |||
| Code Review Guide | |||
| Unit 06: SQL INJECTION ATTACKS – EXPLOITATIONS | |||
| SQL Injection attacks – PDF | |||
| Introduction to SQL Injection | |||
| Dangers of SQL Injection | |||
| Hunting for SQL Injection vulnerabilities | |||
| In-band SQL Injection attacks | |||
| Blind SQL Injection attack in-action | |||
| Exploiting SQL injection – SQLMap | |||
| Fuzzing for SQL Injection – Burp Intruder | |||
| Unit 07: CROSS SITE REQUEST FORGERY – XSRF | |||
| CSRF or XSRF attack methods | |||
| Anti-CSRF Token methods | |||
| Anti-CSRF token stealing-NOT easy | |||
| Unit 08: AUTHENTICATION & AUTHORIZATION ATTACKS | |||
| Authentication bypass-hydra | |||
| HTTP Verb Tampering | |||
| HTTP parameter pollution – HPP | |||
| Authentication | |||
| Unit 09: CLIENT SIDE SECURITY TESTING | |||
| Client side control bypass | |||
| Unit 10: FILE RELATED VULNERABILITIES | |||
| LFI & RFI attacks | |||
| Unrestricted file upload – content type | |||
| Unrestricted File Upload – Extension Type | |||
| Remote code execution using Shell Uploads | |||
| Unit 11: XML EXTERNAL ENTITY ATTACKS – XXE | |||
| XML Documents & database | |||
| XXE attacks in action | |||
| Resources | |||
| Advance intruder attack types | |||
| Finding details with open source | |||