17 Sections
122 Lessons
24 Weeks
Expand all sections
Collapse all sections
PHP
23
1.1
PHP Installation
1 Hour
1.2
HTTP Requests and Responses
1 Hour
1.3
PHP Script: Display Basic Webpage
1 Hour
1.4
PHP Data Types
1 Hour
1.5
NULL and Empty in PHP
1 Hour
1.6
PHP Logical Expressions
1 Hour
1.7
PHP While Loops
1 Hour
1.8
PHP Scope and Global Variables
1 Hour
1.9
$_get Superglobal
1 Hour
1.10
$_POST Superglobal
1 Hour
1.11
$_SERVER Superglobal
1 Hour
1.12
File Upload in PHP
1 Hour
1.13
$_COOKIE Superglobal
1 Hour
1.14
$_SESSION Superglobal
1 Hour
1.15
HTTP Security Response Headers
1 Hour
1.16
Modifying Headers
1 Hour
1.17
Content Security Policy (CSP)
1 Hour
1.18
PHP Regular Expressions
1 Hour
1.19
Encoding and Decoding in PHP
1 Hour
1.20
Including and Requiring Files in PHP
1 Hour
1.21
Running OS Commands in PHP
1 Hour
1.22
Type Juggling and Type Casting in PHP
1 Hour
1.23
Validation Functions
1 Hour
MySQL
10
2.1
MySQL and Database Concepts
1 Hour
2.2
Database Structure
1 Hour
2.3
Inserting Data Into Tables
1 Hour
2.4
SQL Select (Read Data)
1 Hour
2.5
Special WHERE Clauses in My Sql
1 Hour
2.6
PRIMARY KEY and FOREIGN KEY Constraints
1 Hour
2.7
MySQL Group By Clause
1 Hour
2.8
IF Clause
1 Hour
2.9
SubQuery
1 Hour
2.10
Information_schema Metadata Queries in MySQL
1 Hour
PHP and Mysql
4
3.1
Retrieving Data from MySQL with PHP (mysqli)
1 Hour
3.2
Creating Records with PHP
1 Hour
3.3
Retrieving Data from MySQL with PHP (mysqli)
1 Hour
3.4
Delete Records with PHP
1 Hour
Web Application Penetration Test
14
4.1
Web Application Penetration Test
1 Hour
4.2
OWASP Juice Shop Installation
1 Hour
4.3
PHP Open Source Projects
1 Hour
4.4
Burp Suite
1 Hour
4.5
Installing Burp CA Certificate on Kali Linux
1 Hour
4.6
Sandbox in Web Application Security
1 Hour
4.7
Addons and Extensions
1 Hour
4.8
Application Programming Interface (API)
1 Hour
4.9
Target Tab in Burp Suite
1 Hour
4.10
Proxy tab in Burp Suite
1 Hour
4.11
Burp Proxy Repeater
1 Hour
4.12
Intruder tool in Burp Suite
1 Hour
4.13
Open Worldwide Application Security Project
1 Hour
4.14
Open Worldwide Application Security Project – 2
1 Hour
HTML Injection Vulnerability
5
5.1
HTML Injection Vulnerability
1 Hour
5.2
Html Injection White List
1 Hour
5.3
htmlentities() vs htmlspecialchars()
1 Hour
5.4
HTML Injection – IFrame Vulnerable
1 Hour
5.5
html injection read file
1 Hour
Cross-Site Scripting(XSS)
10
6.1
Cross-Site Scripting(XSS)
1 Hour
6.2
Types of XSS
1 Hour
6.3
Cross-Site Scripting(XSS) Code Analysis
1 Hour
6.4
File Upload XSS
1 Hour
6.5
Stored (Persistent) XSS
1 Hour
6.6
Owasp Juice Shop Scoreboard
1 Hour
6.7
DOM Based Cross Site Scripting
1 Hour
6.8
DOM-Based Cross-Site Scripting – 2
1 Hour
6.9
Blind XSS
1 Hour
6.10
Content Security Policy Bypass
1 Hour
Code Injection
4
7.1
Code Injection
1 Hour
7.2
Code Injection – 2
1 Hour
7.3
Code Injection Payloads
1 Hour
7.4
Code Injection Payloads – 2
1 Hour
OS Command Injection
3
8.1
OS Command Injection
1 Hour
8.2
OS Command Injection Example
1 Hour
8.3
Blind OS Command Injection Example
1 Hour
File Inclusion Vulnerability
11
9.1
File Inclusion Vulnerability
1 Hour
9.2
Remote File Inclusion (RFI) Example in PHP
1 Hour
9.3
Local File Inclusion (LFI)
1 Hour
9.4
ssh2 wrapper
1 Hour
9.5
Null-Byte Injection
1 Hour
9.6
File Upload Abuse
1 Hour
9.7
SSH Log Poisoning
1 Hour
9.8
LFI and PID Leads to RCE
1 Hour
9.9
LFI to RCE via phpinfo()
1 Hour
9.10
PHP Sessions and Local File Inclusion (LFI) Attack
1 Hour
9.11
PHP Sessions and Local File Inclusion (LFI) Attack 2.mkv
1 Hour
File Upload Vulnerability
4
10.1
Unrestricted File Upload
1 Hour
10.2
File Upload
1 Hour
10.3
File Magic Number Spoofing to Mimic GIF
1 Hour
10.4
getimagesize in file upload
1 Hour
SQL Injection (SQLi)
19
11.1
SQL Injection (SQLi)
1 Hour
11.2
Types of SQL Injections (SQLi)
1 Hour
11.3
Sql Injection(sqli) Lab setup
11.4
Classic approach in error-based and union-based SQL injection
1 Hour
11.5
Techniques for Error-Based SQL Injection
1 Hour
11.6
Payloads for error-based SQL injection to extract information
1 Hour
11.7
Double Query Injection (DQI)
1 Hour
11.8
Double Query Injection Exploitation
1 Hour
11.9
Double Query Injection Exploitation – 3
1 Hour
11.10
SQL Commands Used in Blind SQL Injection
1 Hour
11.11
Boolean Type Sqli
1 Hour
11.12
Time-based Blind SQL Injection
1 Hour
11.13
Authentication Bypass – SQL Injection
1 Hour
11.14
Authentication Bypass Payloads – SQL Injection
1 Hour
11.15
Dumping Data Injection
1 Hour
11.16
Second-Order SQL Injection
1 Hour
11.17
Sqlmap
1 Hour
11.18
Sqli Map – Post Request Attacks
1 Hour
11.19
Ghauri
1 Hour
Unvalidated Redirects and Forwards
2
12.1
Unvalidated Redirects and Forwards
1 Hour
12.2
Open Redirect Payload
1 Hour
Rate Limiting in Web App
2
13.1
Rate Limiting in Web App
1 Hour
13.2
Rate Limiting – Login Registration
1 Hour
XML eXternal entity (XXE)
4
14.1
XML eXternal entity (XXE) Injection
1 Hour
14.2
exfiltrate data using a malicious external DTD
1 Hour
14.3
XML eXternal entity (XXE) Injection 2
1 Hour
14.4
Exploiting blind XXE to retrieve data via error messages
1 Hour
Cross-site Request Forgery (CSRF XSRF)
3
15.1
Cross-site Request Forgery (CSRF XSRF)
1 Hour
15.2
Same Site Cookies
1 Hour
15.3
CSRF Token
1 Hour
SSRF (Server-Side Request Forgery)
3
16.1
Time-Based SSRF
1 Hour
16.2
Server-Side Request Forgery (SSRF) Payloads
1 Hour
16.3
SSRF in juice shop
1 Hour
Authentication Testing
1
17.1
Username Enumeration via Different Responses
1 Hour
Web Application Penetration Testing (Pentesting)
Off
On
Search
Curriculum
This content is protected, please
login
and enroll in the course to view this content!
Login with your site account
Lost your password?
Remember Me
Modal title
Main Content