11 Sections
97 Lessons
24 Weeks
Expand all sections
Collapse all sections
PHP
23
1.1
PHP Installation
1 Hour
1.2
HTTP Requests and Responses
1 Hour
1.3
PHP Script: Display Basic Webpage
1 Hour
1.4
PHP Data Types
1 Hour
1.5
NULL and Empty in PHP
1 Hour
1.6
PHP Logical Expressions
1 Hour
1.7
PHP While Loops
1 Hour
1.8
PHP Scope and Global Variables
1 Hour
1.9
$_get Superglobal
1 Hour
1.10
$_POST Superglobal
1 Hour
1.11
$_SERVER Superglobal
1 Hour
1.12
File Upload in PHP
1 Hour
1.13
$_COOKIE Superglobal
1 Hour
1.14
$_SESSION Superglobal
1 Hour
1.15
HTTP Security Response Headers
1 Hour
1.16
Modifying Headers
1 Hour
1.17
Content Security Policy (CSP)
1 Hour
1.18
PHP Regular Expressions
1 Hour
1.19
Encoding and Decoding in PHP
1 Hour
1.20
Including and Requiring Files in PHP
1 Hour
1.21
Running OS Commands in PHP
1 Hour
1.22
Type Juggling and Type Casting in PHP
1 Hour
1.23
Validation Functions
1 Hour
MySQL
10
2.1
MySQL and Database Concepts
1 Hour
2.2
Database Structure
1 Hour
2.3
Inserting Data Into Tables
1 Hour
2.4
SQL Select (Read Data)
1 Hour
2.5
Special WHERE Clauses in My Sql
1 Hour
2.6
PRIMARY KEY and FOREIGN KEY Constraints
1 Hour
2.7
MySQL Group By Clause
1 Hour
2.8
IF Clause
1 Hour
2.9
SubQuery
1 Hour
2.10
Information_schema Metadata Queries in MySQL
1 Hour
PHP and Mysql
4
3.1
Retrieving Data from MySQL with PHP (mysqli)
1 Hour
3.2
Creating Records with PHP
1 Hour
3.3
Retrieving Data from MySQL with PHP (mysqli)
1 Hour
3.4
Delete Records with PHP
1 Hour
Web Application Penetration Test
14
4.1
Web Application Penetration Test
1 Hour
4.2
OWASP Juice Shop Installation
1 Hour
4.3
PHP Open Source Projects
1 Hour
4.4
Burp Suite
1 Hour
4.5
Installing Burp CA Certificate on Kali Linux
1 Hour
4.6
Sandbox in Web Application Security
1 Hour
4.7
Addons and Extensions
1 Hour
4.8
Application Programming Interface (API)
1 Hour
4.9
Target Tab in Burp Suite
1 Hour
4.10
Proxy tab in Burp Suite
1 Hour
4.11
Burp Proxy Repeater
1 Hour
4.12
Intruder tool in Burp Suite
1 Hour
4.13
Open Worldwide Application Security Project
1 Hour
4.14
Open Worldwide Application Security Project – 2
1 Hour
HTML Injection Vulnerability
5
5.1
HTML Injection Vulnerability
1 Hour
5.2
Html Injection White List
1 Hour
5.3
htmlentities() vs htmlspecialchars()
1 Hour
5.4
HTML Injection – IFrame Vulnerable
1 Hour
5.5
html injection read file
1 Hour
Cross-Site Scripting(XSS)
10
6.1
Cross-Site Scripting(XSS)
1 Hour
6.2
Types of XSS
1 Hour
6.3
Cross-Site Scripting(XSS) Code Analysis
1 Hour
6.4
File Upload XSS
1 Hour
6.5
Stored (Persistent) XSS
1 Hour
6.6
Owasp Juice Shop Scoreboard
1 Hour
6.7
DOM Based Cross Site Scripting
1 Hour
6.8
DOM-Based Cross-Site Scripting – 2
1 Hour
6.9
Blind XSS
1 Hour
6.10
Content Security Policy Bypass
1 Hour
Code Injection
4
7.1
Code Injection
1 Hour
7.2
Code Injection – 2
1 Hour
7.3
Code Injection Payloads
1 Hour
7.4
Code Injection Payloads – 2
1 Hour
OS Command Injection
3
8.1
OS Command Injection
1 Hour
8.2
OS Command Injection Example
1 Hour
8.3
Blind OS Command Injection Example
1 Hour
File Inclusion Vulnerability
11
9.1
File Inclusion Vulnerability
1 Hour
9.2
Remote File Inclusion (RFI) Example in PHP
1 Hour
9.3
Local File Inclusion (LFI)
1 Hour
9.4
ssh2 wrapper
1 Hour
9.5
Null-Byte Injection
1 Hour
9.6
File Upload Abuse
1 Hour
9.7
SSH Log Poisoning
1 Hour
9.8
LFI and PID Leads to RCE
1 Hour
9.9
LFI to RCE via phpinfo()
1 Hour
9.10
PHP Sessions and Local File Inclusion (LFI) Attack
1 Hour
9.11
PHP Sessions and Local File Inclusion (LFI) Attack 2.mkv
1 Hour
File Upload Vulnerability
4
10.1
Unrestricted File Upload
1 Hour
10.2
File Upload
1 Hour
10.3
File Magic Number Spoofing to Mimic GIF
1 Hour
10.4
getimagesize in file upload
1 Hour
SQL Injection (SQLi)
9
11.1
SQL Injection (SQLi)
1 Hour
11.2
Types of SQL Injections (SQLi)
1 Hour
11.3
Sql Injection(sqli) Lab setup
11.4
Classic approach in error-based and union-based SQL injection
1 Hour
11.5
Techniques for Error-Based SQL Injection
1 Hour
11.6
Payloads for error-based SQL injection to extract information
1 Hour
11.7
Double Query Injection (DQI)
1 Hour
11.8
Double Query Injection Exploitation
1 Hour
11.9
Double Query Injection Exploitation – 3
1 Hour
Web Application Penetration Testing (Pentesting)
Off
On
Search
Curriculum
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Modal title
Main Content