About Course
This course covers essential website security practices and exploitation techniques. You will learn how to identify common vulnerabilities, perform attacks like XSS, SQL injection, CSRF, and gain hands-on experience securing websites from various threats. It also includes real-world demonstrations and tools used in ethical hacking.
Learn website security, exploit vulnerabilities, and safeguard web applications from attacks.
Requirements
- ✓Basic knowledge of web technologies (HTML, JavaScript, CSS).
- ✓Interest in ethical hacking and website security.
- ✓A computer with internet access.
- ✓Willingness to learn exploitation techniques and website defense.
Course Curriculum
Section 1. Introduction
1. Introduction
2. Why This Course is important
3. Course Outline
4. Tips To learn hacking and Security
5. Who Should Attend Summary
Assessment Exercise- 1
Section 2. Cross site Scripting XSS
6. What is a Cross site Scripting XSS and prerequisites
7. Types of Cross site Scripting XSS
8. How to Find Cross site Scripting XSS with Dorks
9. What is Get Post Method How to Convert Post
10. What is Non Persistent XSS With Examples
11. Non Persistent XSS Demonstration
12. Persistent or Stored XSS with Demonstration
13. What is DOM XSS with Demonstration
14. How to Use Firefox Addons to Find a cross site scripting XSS
15. Demonstration with Live Examples
16. How to Secure a website From XSS and Important Points
Assessment Exercise- 2
Section 3. SQL Injection
17. Introduction to SQL Injection
18. Types of SQL Injection(1)
19. How to Find a SQL Injection (Demonstration)
20. How to Find a SQL Injection with Google Dorks
21. How to Find a SQL Injection With Havij
22. How to Find a SQL Injection With sqlmap
23. Blind SQL injection Demonstration How to Secure a Website
Assessment Exercise- 3
Section 4. Cross Site Request Forgery CSRF
24. What is Cross site Request Forgery CSRF
25. Cross Site Request Forgery CSRF Demonstration
26. Demonstration With Live Examples
27. How to Secure a Website From CSRF Vulnerabilities
Assessment Exercise- 4
Section 5. HTTP Parameter Pollution
28. What is HTTP Parameter Pollution
29. Client and Server side HTTP Parameter Pollution
30. HTTP Parameter Pollution Demonstration
31. Security of HTTP Parameter Pollution
32. How to Secure HTTP Parameter Pollution
Assessment Exercise- 5
Section 6. Parameter Manipulation
33. What is Parameter Manipulation Types (Part A)
34. What is Parameter Manipulation Types (Part B)
35. Cookie Manipulation
36. HTTP Header Manipulation
37. URL Manipulation
Assessment Exercise- 6
Section 7. Secure Socket Layer SSL
38. What is SSL
39. Why SSL is important for Web Applications
40. How To Find SSL and Secure a Web Application
Assessment Exercise- 7
Section 8. Remote File Inclusion RFI
42. What is Remote File inclusion RFI
43. How to Find Remote file inclusion RFI (Demonstration)
44. How to Secure a Web Application From RFI
Assessment Exercise- 8
Section 9. Directory Transversal Attack or LFI
45. What is a Directory Transversal Attack or LFI
46. How to Find Directory Transversal Attack or LFI
Assessment Exercise- 9
Section 10. Common Web Application Vulnerabilities
47. What is Clickjacking with Demonstration
48. What is URL Redirection
49. How to Secure a Web application From URL Redirection
50. Host Header Attack
51. Business Logic Flaw
52. How hacker Uploads a Shell on Web Application
Assessment Exercise- 10
Section 11. WordPress Security - Learn How to Secure
53. Introduction to WordPress Security
54. WordPress Exploitation
55. How to Secure a WordPress
Assessment Exercise- 11
Section 12. Top Kali Linux Tools and Others
56. Introduction to Kali Linux
57. How to Install Kali Linux
58. Kali Linux Demonstration (OWASP Zap, Maltego)
59. How to use Joomla Security Scanner In Kali Linux
60. How To Setup And Use Xerxes DOS Tool
61. How to Use DirBuster (Part A)
62. How to Use DirBuster (Part B)
63. How to use dnsmap in Kali Linux
64. How to use Uniscan web vulnerability
65. How to use Vega Web Vulnerability Scanner
66. How to Use a Netsparker Web Security Scanner
67. How to Use an Acunetix Web Security Scanner
68. Final Class of Security Scanner
Assessment Exercise- 12
Section 13. Symlink
69. Introduction to Symlink
70. Manual Symlink
71. Auto Symlink
Assessment Exercise- 13
Section 14. Additional Content (WiFi, Email, Facebook, and Android Hacking)
72. Introduction to Android Hacking Security
73. What is email spoofing with Demonstration
74. What is a Phishing Attack Demonstration
75. How to Hack a Wifi Password
Assessment Exercise- 14
Section 15. Computer Hacking and Security
76. Introduction to Computer Hacking (Darkcomet)
77. How Hacker Spreads Virus Rat and Backdoor on Your Computer
78. Complete Demonstration of Darkcomet
79. How To Trace
80. How to Protect Your Computer
Assessment Exercise- 15
Section 16. Final Exam
Final Exam
What You Will Learn
- ✓Understand various website vulnerabilities and how to exploit them.
- ✓Learn to perform XSS, SQL Injection, CSRF, and other common attacks.
- ✓Use tools like Kali Linux for penetration testing and vulnerability scanning.
- ✓Apply security measures to protect websites from various threats.
- ✓Demonstrate live examples of website exploitation and defenses.
- ✓Understand how to prevent common web application attacks.