Course Overview

Sometimes, it becomes a challenge for ethical hackers to check whether they are working in a legal environment. Websites and web applications thus indicate if the ethical hacker is working in an ideal hacking environment. These applications help the ethical hacker to build confidence and get comfortable with finding vulnerabilities and discovering new vulnerabilities.  

In this course, we will learn what intentionally vulnerable applications are and why there are needed. You will learn how to exploit vulnerabilities on BWapp. This course will teach you how to perform SQL injection attacks on the CTFLearn platform and other web application attacks on OWASP Mutillidae. We will learn how to perform penetration tests on WebGoat and Google Gruyere. 

By the end of this course, you will be well versed in solving problems by using popular intentionally vulnerable apps and becoming industry-ready. If you want to see the real hacking tips and techniques on the move, then this course is for you.

What You Will Learn

  • Learn what OWASP Top 10 vulnerabilities are practically.
  • Find out how SQL Injection attacks are performed.
  • Understand Cross-site Scripting attacks including Reflected XSS
  • DOM XSS
  • and Stored XSS.
  • Learn about IDOR
  • XXE attack
  • and many more.

Program Curriculum

  • Installing bWAPP
  • Installing DVWA
  • Installing OWASP Mutillidae
  • Installing WebGoat
  • Setting up Google Gruyere
  • CTFLearn
  • $7 Million Cybersecurity Scholarship by EC-Council
  • Chapter 1 Quiz

  • Learning Objectives
  • Launching Burp-Suite
  • Using Foxy-proxy
  • Intruder
  • Repeater
  • Chapter 2 Lab
  • Chapter 2 Quiz

  • OS Injection Attack
  • SQL Injection Attack
  • Cross-site Scripting Attack
  • File Inclusion Attack
  • Cross-site Request Forgery
  • XML External Entity (XXE) Attack
  • Session Hijacking Attack
  • Brute-force Attack
  • Insecure Direct Object References (IDOR) Attack
  • Chapter 3 Quiz

  • Learning Objective
  • PHP Code Injection Attack
  • SQL Injection Attack
  • Session Hijacking
  • XML External Entity (XXE) Attack
  • Insecure Direct Object References (IDOR) Attack
  • Reflected Cross-site Scripting (XSS) Attack
  • Stored Cross-site Scripting (XSS) Attack
  • Chapter 4 Lab
  • Chapter 4 Quiz

  • Learning Objective
  • Introduction to DVWA
  • Brute-force Attack
  • Command Injection
  • SQL Injection Attack
  • Reflected Cross-site Scripting (XSS) Attack
  • Stored Cross-site Scripting (XSS) Attack
  • DOM-based Cross-site Scripting (XSS) Attack
  • Cross-site Request Forgery (CSRF) Attack
  • Chapter 5 Lab
  • Chapter 5 Quiz

  • Learning Objectives
  • OS Injection Attack
  • SQL Injection Attack
  • Reflected Cross-site Scripting (XSS) Attack
  • Discovering Hidden Directories
  • File Inclusion Attack
  • Sensitive Data Exposure
  • Chapter 6 Lab
  • Chapter 6 Quiz

  • Learning Objectives
  • Introduction to WebGoat
  • Basics of SQL Queries
  • Introduction to SQL Injection Attack
  • Launching SQL Injection Attack
  • Bypass Two-factor Authentication
  • XML External Entities (XXE) Attack
  • Cross-site Scripting Attack
  • Chapter 7 Lab
  • Chapter 7 Quiz

  • File Upload XSS Attack
  • Reflected Cross-site Scripting (XSS) Attack
  • Privilege Escalation
  • Sensitive Data Exposure
  • Chapter 8 Lab
  • Chapter 8 Quiz

  • Introduction to SQL Injection Attack
  • SQL Injection Attack
  • POST Practice
  • Chapter 9 Quiz
Load more modules

Instructor

Rajneesh Gupta

Rajneesh Gupta has 9 assertive years in information security have led him to do one thing: Build InfoSec solutions that actually work. He has worked with organizations such as HP Enterprise, Alcatel-Lucent, Reliance Communications. He is currently working as Principal Consultant at Tesseract Global and helps businesses make security possible by enabling visibility, engagement, and leadership. Diverse security leadership experience, including roles in operations, system integration, security architecture, project management, Identity, and Access management, business continuity planning, IT risk management, and information security. He has delivered multiple assignments on Cyber Security, Payments, PCI DSS, SSAE16, ISO20000, BS25999, ISO 27001, Secure Architecture Design & Solution Implementation, IT Security & Risk Management, IT Audit, Advisory & Assurance and Business Process & Controls Improvement for enterprises in United States, Singapore, India, UAE & UK.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8