Register to Ethical Hacking Course for complete Vdo tutorial, hacking challenges and project.
- Digital Footprints and Information Gathering
- Advanced Information Gathering about People and Websites
- Google Dorking- Hacking using Google
- Introduction to Web Architecture and Understanding Common
- Security Misconceptions
- HTML Basics
- HTML and Introduction to Javascript
- Introduction to PHP and Setting up XAMPP
- Putting Brains into Beauty- Working with PHP
- Handling User Input and Building Basic Applications using PHP
- Module Test
- Introduction to VAPT and OWASP
- Basics of Databases and SQL
- Authentication Bypass using SQL Injection
- GET based SQL Injection- Part 1
- GET based SQL Injection- Part 2
- POST based SQL Injection- Part 1
- POST based SQL Injection- Part 2
- Advanced SQL Injections
- Automating SQL Injections- SQL Map
- Module Test
- Client-Side Attacks
- Bypassing Client-Side Filters using Burp
- Suite
- IDOR and Rate-limiting issues
- Arbitrary File Upload Vulnerabilities
- Module Test
- Understanding Important Response Headers, DOM,and Event Listeners
- Fundamentals of Cross-Site Scripting (XSS)
- Understanding Forced Browsing and Session-Cookie Flaws
- Cross-Site Request Forgery (CSRF) and Open Redirections
- Brute Force Attacks using Burp Suite
- Personally Identifiable Information (PII) Leakage and Sensitive Information Disclosure
- Module Test
- Common Security Misconfigurations
- Default/Weak Password Vulnerabilities
- Fingerprinting Components with Known Vulnerabilities
- Scanning for Bugs in Wordpress and Drupal
- Using Public Exploits and Looking at Live Case Studies
- Module Test
- Information Gathering for Endpoints
- Application Assessment using Nmap
- Automating VAPT with Nikto and Burp Suite Pro
- Concepts of Code Security and Patching
- Module Test