Hacking Web Applications

Hacking Web Applications

The Cyber Mentor via YouTube Direct link

- Course Overview

3 of 28

3 of 28

- Course Overview

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Hacking Web Applications

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Introduction
  2. 2 - NordPass Sponsorship
  3. 3 - Course Overview
  4. 4 - The OWASP Top 10
  5. 5 - Installing OWASP Juice Shop
  6. 6 - Installing Foxy Proxy
  7. 7 - Exploring Burp Suite
  8. 8 - Introducing the Score Board
  9. 9 - SQL Injection Overview
  10. 10 - SQL Injection Walkthrough
  11. 11 - SQL Injection Defenses
  12. 12 - Broken Authentication Attacks and Defenses
  13. 13 - Testing for Broken Authentication
  14. 14 - Sensitive Data Exposure Attacks and Defenses
  15. 15 - Testing for Sensitive Data Exposure
  16. 16 - XML External Entities XXE Overview
  17. 17 - XXE Attacks and Defenses
  18. 18 - Broken Access Control Overview
  19. 19 - Broken Access Control Walkthrough
  20. 20 - Security Misconfigurations Overview
  21. 21 - Cross-Site Scripting XSS Overview
  22. 22 - Reflected XSS Walkthrough
  23. 23 - Stored XSS Walkthrough
  24. 24 - Preventing XSS
  25. 25 - Insecure Deserialization
  26. 26 - Using Components with Known Vulnerabilities
  27. 27 - Insufficient Logging and Monitoring
  28. 28 - Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.