Course curriculum
-
1
Chapter 0: Read before start
-
Introduction to the Course
-
Importance of the Course
-
Overview of the Course
-
Skills and Opportunities
-
-
2
WAP & Ethical Hacking in line with various frameworks
-
WAP class 00
-
01 what is a web app
-
What is a Web App_ Web App vs. Native App (Enable subtitles and watch the video please)
-
02 Why its difficult to secure web applications
-
Please use google translator and read this in your native language.
-
OWASP Top Ten
-
top-3-reasons-appsec-programs-fail-veracode
-
Web Application Security
-
ISO 27034 Standard review
-
-
3
Threat Modelling and Its importance
-
WAP and the importance of Threat Modelling
-
Threat Modeling
-
Threat Modelling by Microsoft
-
Getting started with the Threat Modeling Tool
-
Secure development best practices on Microsoft Azure
-
-
4
The importance of Code Review
-
WAP Why Source code review
-
Secure Code Review
-
Secure Code Review another angle
-
OWASP_Code_Review_Guide_v2
-
-
5
Tools of the trade SAST vs DAST vs IAST vs OAST
-
WAP SAST DAST IAST and OAST
-
Build your arsenal and test out these tools
-
Magic Quadrant for Application Security Testing
-
-
6
Penetration Testing Methodologies
-
Penetration Testing Methodologies Take 1 WSTG
-
WSTG Read this in your native language please.
-
WSTG Guide Link
-
-
7
Lab for WAP
-
Perform XSS Stored
-
Os Command Execution
-
OS Command - Lab
-
The Harverster
-
The Harvester - Lab
-
Role Hijacking
-
Shodan a Search Engine
-
FTP Login
-
FTP Login
-
FTP - Lab
-
Arachni
-
Arachni - Lab
-
Admin Panel Hacking
-
Admin Panel Hacking
-