Ethical Hacking Bootcamp for Tech Professionals
Master ethical hacking techniques to fortify your defenses against cyber threats and safeguard your organization's digital assets.
...
Share
Web Application Vulnerabilities: Foundations
Unit 1: Web App Security Fundamentals
Web App Security 101
Web App Architecture
Authentication Basics
Session Management
Input Validation
Unit 2: SQL Injection (SQLi)
SQLi: What and Why?
SQLi: Lab Setup
SQLi: Basic Exploitation
SQLi: Blind Injection
SQLi: Prevention
Unit 3: Cross-Site Scripting (XSS)
XSS: What and Why?
XSS: Reflected
XSS: Stored
XSS: Prevention
Unit 4: CSRF
CSRF: What and Why?
CSRF: Prevention
Advanced Web Application Exploitation
Unit 1: Advanced SQL Injection
Blind SQL Injection
SQLi Error Handling
SQLi: Stacked Queries
Bypassing SQLi Filters
Unit 2: Advanced XSS
DOM-Based XSS
Bypassing XSS Filters
XSS and Content Security
XSS Payloads
Unit 3: CSRF and SSRF
Advanced CSRF
SSRF Vulnerabilities
SSRF: Bypassing Filters
Unit 4: OWASP Top 10 and Privilege Escalation
OWASP Top 10: Overview
Privilege Escalation
Insecure Deserialization
Static and Dynamic Code Analysis
Unit 1: Static Code Analysis Fundamentals
Intro to Static Analysis
Static Analysis Techniques
Tools for Static Analysis
Configuring Static Tools
Interpreting Static Results
Unit 2: Dynamic Code Analysis Fundamentals
Intro to Dynamic Analysis
Dynamic Analysis Techniques
Tools for Dynamic Analysis
Setting Up Dynamic Tools
Interpreting Dynamic Results
Unit 3: Comparing Static and Dynamic Analysis
Static vs. Dynamic
When to Use Which
Case Studies
Future Trends
Penetration Testing Tools: Nmap and Wireshark
Unit 1: Nmap Fundamentals
Intro to Nmap
Nmap Installation
Basic Nmap Syntax
Nmap Help!
Ping Sweep
Unit 2: Advanced Nmap Scanning Techniques
TCP Connect Scan
SYN Scan (Stealth)
UDP Scan
Version Detection
OS Detection
Unit 3: Wireshark for Packet Analysis
Wireshark Intro
Capture Filters
Display Filters
Following TCP Streams
Metasploit Framework for Exploitation
Unit 1: Metasploit Fundamentals
Intro to Metasploit
Setting Up Your Lab
MSFConsole Basics
Modules Overview
Payloads Explained
Unit 2: Exploitation Techniques
Scanning with Metasploit
Auto Exploitation
Manual Exploitation
Meterpreter Magic
Post-Exploitation Fun
Unit 3: Advanced Metasploit
Bypassing Defenses
Custom Payloads
Resource Scripts
Ethics and Legality
Secure Coding Practices and Remediation
Unit 1: Secure Coding Principles
Intro to Secure Coding
Input Validation
Output Encoding
Authentication & Authorization
Session Management
Unit 2: Vulnerability-Specific Secure Coding
Preventing SQL Injection
Preventing XSS
Preventing CSRF
Error Handling
Crypto Done Right
Unit 3: Remediation and Reporting
Security Reports: Intro
Prioritizing Remediation
Fixing Flaws
Validation