9 Sections
78 Lessons
24 Weeks
Expand all sections
Collapse all sections
PHP
23
1.1
PHP Installation
1 Hour
1.2
HTTP Requests and Responses
1 Hour
1.3
PHP Script: Display Basic Webpage
1 Hour
1.4
PHP Data Types
1 Hour
1.5
NULL and Empty in PHP
1 Hour
1.6
PHP Logical Expressions
1 Hour
1.7
PHP While Loops
1 Hour
1.8
PHP Scope and Global Variables
1 Hour
1.9
$_get Superglobal
1 Hour
1.10
$_POST Superglobal
1 Hour
1.11
$_SERVER Superglobal
1 Hour
1.12
File Upload in PHP
1 Hour
1.13
$_COOKIE Superglobal
1 Hour
1.14
$_SESSION Superglobal
1 Hour
1.15
HTTP Security Response Headers
1 Hour
1.16
Modifying Headers
1 Hour
1.17
Content Security Policy (CSP)
1 Hour
1.18
PHP Regular Expressions
1 Hour
1.19
Encoding and Decoding in PHP
1 Hour
1.20
Including and Requiring Files in PHP
1 Hour
1.21
Running OS Commands in PHP
1 Hour
1.22
Type Juggling and Type Casting in PHP
1 Hour
1.23
Validation Functions
1 Hour
MySQL
10
2.1
MySQL and Database Concepts
1 Hour
2.2
Database Structure
1 Hour
2.3
Inserting Data Into Tables
1 Hour
2.4
SQL Select (Read Data)
1 Hour
2.5
Special WHERE Clauses in My Sql
1 Hour
2.6
PRIMARY KEY and FOREIGN KEY Constraints
1 Hour
2.7
MySQL Group By Clause
1 Hour
2.8
IF Clause
1 Hour
2.9
SubQuery
1 Hour
2.10
Information_schema Metadata Queries in MySQL
1 Hour
PHP and Mysql
4
3.1
Retrieving Data from MySQL with PHP (mysqli)
1 Hour
3.2
Creating Records with PHP
1 Hour
3.3
Retrieving Data from MySQL with PHP (mysqli)
1 Hour
3.4
Delete Records with PHP
1 Hour
Web Application Penetration Test
14
4.1
Web Application Penetration Test
1 Hour
4.2
OWASP Juice Shop Installation
1 Hour
4.3
PHP Open Source Projects
1 Hour
4.4
Burp Suite
1 Hour
4.5
Installing Burp CA Certificate on Kali Linux
1 Hour
4.6
Sandbox in Web Application Security
1 Hour
4.7
Addons and Extensions
1 Hour
4.8
Application Programming Interface (API)
1 Hour
4.9
Target Tab in Burp Suite
1 Hour
4.10
Proxy tab in Burp Suite
1 Hour
4.11
Burp Proxy Repeater
1 Hour
4.12
Intruder tool in Burp Suite
1 Hour
4.13
Open Worldwide Application Security Project
1 Hour
4.14
Open Worldwide Application Security Project – 2
1 Hour
HTML Injection Vulnerability
5
5.1
HTML Injection Vulnerability
1 Hour
5.2
Html Injection White List
1 Hour
5.3
htmlentities() vs htmlspecialchars()
1 Hour
5.4
HTML Injection – IFrame Vulnerable
1 Hour
5.5
html injection read file
1 Hour
Cross-Site Scripting(XSS)
10
6.1
Cross-Site Scripting(XSS)
1 Hour
6.2
Types of XSS
1 Hour
6.3
Cross-Site Scripting(XSS) Code Analysis
1 Hour
6.4
File Upload XSS
1 Hour
6.5
Stored (Persistent) XSS
1 Hour
6.6
Owasp Juice Shop Scoreboard
1 Hour
6.7
DOM Based Cross Site Scripting
1 Hour
6.8
DOM-Based Cross-Site Scripting – 2
1 Hour
6.9
Blind XSS
1 Hour
6.10
Content Security Policy Bypass
1 Hour
Code Injection
4
7.1
Code Injection
1 Hour
7.2
Code Injection – 2
1 Hour
7.3
Code Injection Payloads
1 Hour
7.4
Code Injection Payloads – 2
1 Hour
OS Command Injection
3
8.1
OS Command Injection
1 Hour
8.2
OS Command Injection Example
1 Hour
8.3
Blind OS Command Injection Example
1 Hour
File Inclusion Vulnerability
5
9.1
File Inclusion Vulnerability
1 Hour
9.2
Remote File Inclusion (RFI) Example in PHP
1 Hour
9.3
Local File Inclusion (LFI)
1 Hour
9.4
ssh2 wrapper
1 Hour
9.5
Null-Byte Injection
1 Hour
Web Application Penetration Testing (Pentesting)
Off
On
Search
Curriculum
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Modal title
Main Content