About Course
This course covers essential website security practices and exploitation techniques. You will learn how to identify common vulnerabilities, perform attacks like XSS, SQL injection, CSRF, and gain hands-on experience securing websites from various threats. It also includes real-world demonstrations and tools used in ethical hacking.
Learn website security, exploit vulnerabilities, and safeguard web applications from attacks.
Requirements
- Basic knowledge of web technologies (HTML, JavaScript, CSS).
- Interest in ethical hacking and website security.
- A computer with internet access.
- Willingness to learn exploitation techniques and website defense.
Course Curriculum
Section 1. Introduction
- 1. Introduction
- 2. Why This Course is important
- 3. Course Outline
- 4. Tips To learn hacking and Security
- 5. Who Should Attend Summary
- Assessment Exercise- 1
Section 2. Cross site Scripting XSS
- 6. What is a Cross site Scripting XSS and prerequisites
- 7. Types of Cross site Scripting XSS
- 8. How to Find Cross site Scripting XSS with Dorks
- 9. What is Get Post Method How to Convert Post
- 10. What is Non Persistent XSS With Examples
- 11. Non Persistent XSS Demonstration
- 12. Persistent or Stored XSS with Demonstration
- 13. What is DOM XSS with Demonstration
- 14. How to Use Firefox Addons to Find a cross site scripting XSS
- 15. Demonstration with Live Examples
- 16. How to Secure a website From XSS and Important Points
- Assessment Exercise- 2
Section 3. SQL Injection
- 17. Introduction to SQL Injection
- 18. Types of SQL Injection(1)
- 19. How to Find a SQL Injection (Demonstration)
- 20. How to Find a SQL Injection with Google Dorks
- 21. How to Find a SQL Injection With Havij
- 22. How to Find a SQL Injection With sqlmap
- 23. Blind SQL injection Demonstration How to Secure a Website
- Assessment Exercise- 3
Section 4. Cross Site Request Forgery CSRF
- 24. What is Cross site Request Forgery CSRF
- 25. Cross Site Request Forgery CSRF Demonstration
- 26. Demonstration With Live Examples
- 27. How to Secure a Website From CSRF Vulnerabilities
- Assessment Exercise- 4
Section 5. HTTP Parameter Pollution
- 28. What is HTTP Parameter Pollution
- 29. Client and Server side HTTP Parameter Pollution
- 30. HTTP Parameter Pollution Demonstration
- 31. Security of HTTP Parameter Pollution
- 32. How to Secure HTTP Parameter Pollution
- Assessment Exercise- 5
Section 6. Parameter Manipulation
- 33. What is Parameter Manipulation Types (Part A)
- 34. What is Parameter Manipulation Types (Part B)
- 35. Cookie Manipulation
- 36. HTTP Header Manipulation
- 37. URL Manipulation
- Assessment Exercise- 6
Section 7. Secure Socket Layer SSL
- 38. What is SSL
- 39. Why SSL is important for Web Applications
- 40. How To Find SSL and Secure a Web Application
- Assessment Exercise- 7
Section 8. Remote File Inclusion RFI
- 42. What is Remote File inclusion RFI
- 43. How to Find Remote file inclusion RFI (Demonstration)
- 44. How to Secure a Web Application From RFI
- Assessment Exercise- 8
Section 9. Directory Transversal Attack or LFI
- 45. What is a Directory Transversal Attack or LFI
- 46. How to Find Directory Transversal Attack or LFI
- Assessment Exercise- 9
Section 10. Common Web Application Vulnerabilities
- 47. What is Clickjacking with Demonstration
- 48. What is URL Redirection
- 49. How to Secure a Web application From URL Redirection
- 50. Host Header Attack
- 51. Business Logic Flaw
- 52. How hacker Uploads a Shell on Web Application
- Assessment Exercise- 10
Section 11. WordPress Security - Learn How to Secure
- 53. Introduction to WordPress Security
- 54. WordPress Exploitation
- 55. How to Secure a WordPress
- Assessment Exercise- 11
Section 12. Top Kali Linux Tools and Others
- 56. Introduction to Kali Linux
- 57. How to Install Kali Linux
- 58. Kali Linux Demonstration (OWASP Zap, Maltego)
- 59. How to use Joomla Security Scanner In Kali Linux
- 60. How To Setup And Use Xerxes DOS Tool
- 61. How to Use DirBuster (Part A)
- 62. How to Use DirBuster (Part B)
- 63. How to use dnsmap in Kali Linux
- 64. How to use Uniscan web vulnerability
- 65. How to use Vega Web Vulnerability Scanner
- 66. How to Use a Netsparker Web Security Scanner
- 67. How to Use an Acunetix Web Security Scanner
- 68. Final Class of Security Scanner
- Assessment Exercise- 12
Section 13. Symlink
- 69. Introduction to Symlink
- 70. Manual Symlink
- 71. Auto Symlink
- Assessment Exercise- 13
Section 14. Additional Content (WiFi, Email, Facebook, and Android Hacking)
- 72. Introduction to Android Hacking Security
- 73. What is email spoofing with Demonstration
- 74. What is a Phishing Attack Demonstration
- 75. How to Hack a Wifi Password
- Assessment Exercise- 14
Section 15. Computer Hacking and Security
- 76. Introduction to Computer Hacking (Darkcomet)
- 77. How Hacker Spreads Virus Rat and Backdoor on Your Computer
- 78. Complete Demonstration of Darkcomet
- 79. How To Trace
- 80. How to Protect Your Computer
- Assessment Exercise- 15
Section 16. Final Exam
- Final Exam

