Web Application Hacking & Penetration Testing – Free Udemy Courses
Learn how to hack web applications and exploit OWASP’s top 10 security vulnerabilities.
What you’ll learn
Web Application Hacking & Penetration Testing – Free Udemy Courses
- Learn web application security vulnerabilities
- Exploit Injection – SQL Injection, Command injection
- Broken Authentication and Session Management
- Sensitive Data Exposure
- XML External Entities (XXE) attack
- Broken Access Control/Insecure Direct Object References
- Security Misconfiguration
- Cross-Site Scripting (XSS) – Persistent XSS, Reflected XSS, Cross Site Request Forgery (CSRF)
- Insecure Deserialization
- Using Components with Known Vulnerabilities
- Insufficient Logging and Monitoring
- Bonus Section – Unvalidated Redirects and Forwards
Requirements
-
Basic IT skills
-
No Hacking knowledge required
Description
If you are looking for a course that provides good coverage of the important top 10 security vulnerabilities in Web Applications shortly and concisely then you have come to the right place !! This course is relevant whether you are looking for applications that are deployed on the cloud or physical servers and VMs since web application vulnerabilities don’t magically disappear just because the application is deployed on the cloud.
This course is focused on practical learning and applying your knowledge. To achieve that the course includes tutorials on how to install the Xampp server and vulnerable applications on your machine so that you can practice what you are learning rather than just watch the tutorials.
Many courses mainly focus on how to exploit the vulnerabilities of physical servers but with the cloud being the preferred way nowadays to deploy applications and also with advances made in securing physical servers learning those techniques may not prove to be very advantageous.
This course covers the below OWASP top 10 web application security risks –
1. Injection – SQL Injection, Command Injection
2. Broken Authentication
3. Sensitive Data Exposure
4. XMLÂ External Entities (XXE)
5. Broken Access Control
6. Security Misconfiguration
7. Cross-Site Scripting (XSS)
8. Insecure Deserialization
9. Using Components with Known Vulnerabilities
10. Insufficient Logging and Monitoring
This course is for educational purposes only.
Who this course is for:
- Anyone interested in learning Web Application Hacking and Penetration Testing
- Students, Developers, Testers, IT Professionals, etc
Add Comment