Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Web Application Security Professional
Module 1: Web Application Security
M.1.1 Introduction to Web Applications (2:28)
M.1.2 Case Studies (17:26)
M.1.3 Web Applications Brief (7:41)
M.1.4 HTML and JavaScript (5:03)
M.1 Web Application Security - Introduction (PDF)
Module 2: Web Application Security: OWASP10
M.2.1 Introduction to OWASP TOP 10 (3:25)
M.2.2 Injection and Error-based Injection (9:10)
M.2.2.A Injection and Error-based Injection (Lab) (6:14)
M.2.3 Authentication Bypass using SQL Injection (1:39)
M.2.3.A Authentication Bypass using SQL Injection (Lab) (3:20)
M.2.4 Blind Injection using SQLMap (5:05)
M.2.4.A Blind Injection using SQLMap (Lab) (2:45)
M.2.5 SQL Injection Mitigations (10:25)
M.2.6 Command Injection (7:02)
M.2.6.A Command Injection (Lab) (2:08)
M.2.7. Broken Authentication (5:52)
M.2.7.A Brute Force (Lab) (2:52)
M.2.7.B Brute Force (Lab) (3:22)
M.2.8 Session Management (8:39)
M.2.8.A Session Management (Lab) (2:23)
M.2.9. Sensitive Data Exposure (3:53)
M.2.9.A Sensitive Data Exposure (Lab) (1:45)
M.2.10 Insufficient Transport Layer Security (6:27)
M.2.10.A Insufficient Transport Layer Security (Lab) (1:11)
M.2.11 A4 XXE (9:30)
M.2.11.A A4 XXE (Lab) (2:10)
M.2.12 A5 Broken Access Control IDOR (5:45)
M.2.12.A A5 Broken Access Control IDOR (Lab) (1:08)
M.2.13 A5 Broken Access Control MFLAC (6:05)
M.2.13.A A5 Broken Access Control MFLAC (Lab) (0:51)
M.2.13.B A5 Broken Access Control MFLAC (Lab) (1:00)
M.2.13.C A5 Broken Access Control MFLAC (Lab) (2:36)
M.2.14 A6 Security Misconfiguration (6:41)
M.2.14.A A6 Security Misconfiguration (Lab) (1:55)
M.2.14.B A6 Security Misconfiguration (Lab) (1:00)
M.2.14.C A6 Security Misconfiguration (Lab) (1:35)
M.2.15 A7 Cross Site Scripting (XSS) (18:42)
M.2.15.A A7 Cross Site Scripting (XSS) (Lab) (3:24)
M.2.16 A8 Insecure Deserialization (4:55)
M.2.17 A9 Using Components with Known Vulnerabilities (5:10)
M.2.17.A A9 Using Components with Known Vulnerabilities (Lab) (2:03)
M.2.18 A10 Insufficient Logging and Monitoring (4:30)
M.2 Web Application Security OWASP10 (PDF)
Module 2: Web Application Security: WAF
M.3.1 Browser-based Vulnerabilities (2:57)
M.3.2 Clickjacking (3:01)
M.3.2.A Clickjacking (Lab) (2:16)
M.3.3 POODLE (3:56)
M.3.4 WebDav (3:58)
M.3.5 WASC (3:37)
M.3.6 Security Frameworks (15:05)
M.3.7 SDLC (22:04)
M.3.8 WAF (7:53)
M.3.9 Case Study Penetrating a Bank (3:26)
M.3.10 Content Spoofing (3:24)
M.3.11 Fingerprinting (1:53)
M.3.12 Advanced Recon (0:51)
M.3 Web Application Security WAF (PDF)
Web Application Security Quiz
Test Your Learning: Easy
Test Your Learning: Medium
Test Your Learning: Difficult
M.2.3 Authentication Bypass using SQL Injection
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock