Web Application Penetration Testing is a process in which we use penetration testing and security skills to find different vulnerabilities in web applications.It plays an important role in every modern organization.But, if your organization does not properly test and secure its web apps, adversaries can compromise these applications, damage business functionality, and steal data.The web application penetration testing key outcome is to identify security weakness across the entire web application and its components (source code, database, back-end network).It also helps in prioritizing the identified vulnerabilities and threats, and possible ways to mitigate them.
Audience
This course is essential for web developer’s, penetration testers,cyber security experts and for the people who want to start their carreer in web pentesting.
- What is Web Application Penetration Testing?
- Penetration Testing – Overview
- Penetration Testing – Testing Environment Setup
- Penetration Testing – Virtual Box Setup
- Penetration Testing – Kali Linux Setup
- Penetration Testing – Metasploitable Linux
- Penetration Testing – Scanning The Target
- Penetration Testing – Shodan.Io Overview
- Penetration Testing – HTTRACK Overview
- Penetration Testing – NMAP Overview
- Penetration Testing – NMAP Scripting Engine
- Penetration Testing – Metasploit Overview
- Penetration Testing – Wireshark Overview
- Penetration Testing – HTTP Basics
- Penetration Testing – Net Cat Overview
- Penetration Testing – Curl Overview
- Penetration Testing – Burp Suite Overview
- Penetration Testing – Cookies Basics07:33
- Penetration Testing – Sessions Basics05:29
- Penetration Testing – Injection Attacks06:24
- Penetration Testing – Cross Site Scripting
- Penetration Testing – HTML Injection
- Penetration Testing – Command Injections
- Penetration Testing – XXE Injections
- Penetration Testing – X Path Injections
- Penetration Testing – SQL Injection
- Penetration Testing – Login Page SQL Injection
- Penetration Testing – Mongo DB Injection
- Penetration Testing – CSS Injection
- Penetration Testing – Un-Validated Redirects
- Penetration Testing – File Inclusion Vulnerability
- Penetration Testing – Local File Inclusion (LFI)
- Penetration Testing – Remote File Inclusion (RFI)
- Penetration Testing – File Upload Vulnerability
- Penetration Testing – Security Misconfiguration
- Penetration Testing – Path Traversal Attack
- Penetration Testing – Cross Site Request Forgery (CSRF)
- Penetration Testing – Server Side Request Forgery (SSRF)
- Penetration Testing – Buffer Overflow05:06
- Penetration Testing – Insecure Direct Object Reference (IDOB)
- Penetration Testing – Captcha Testing10:31
- Penetration Testing – HTTP Basic Authentication Cracking
- Penetration Testing – Formula Injection
- Threat modeling and risk assessment
- Secure coding practices
- Input validation and data sanitization
- Authentication and access control mechanisms
- Session management and cookie security
- Cross-Site Scripting (XSS) prevention
- Cross-Site Request Forgery (CSRF) protection
- SQL injection prevention
- Security headers and HTTP security
- Secure file handling and upload vulnerabilities
- Secure communication protocols (HTTPS)
- Server-side and client-side security considerations
- Web application firewalls (WAF)
- Security testing techniques (penetration testing, vulnerability scanning)
- Secure deployment and configuration management
- Incident response and security incident handling
- Secure software development lifecycle (SDLC) practices
- Emerging threats and latest vulnerabilities in web applications.
About this Course
- Duration 4 Weeks
- Certificate on Completion
- Level Expert
- Price UGX
400,000300,000