Lesson 1 Introduction to Web Application Penetration Testing/001. Learning objectives.mp48.32MB
Lesson 1 Introduction to Web Application Penetration Testing/002. 1.1 Understanding Ethical Hacking and Penetration Testing.mp48.93MB
Lesson 1 Introduction to Web Application Penetration Testing/003. 1.2 Surveying Web Application Penetration Testing Methodologies.mp422.16MB
Lesson 1 Introduction to Web Application Penetration Testing/004. 1.3 Understanding the Need for Web Application Penetration Testing.mp414.43MB
Lesson 1 Introduction to Web Application Penetration Testing/005. 1.4 Exploring How Web Applications Have Evolved Over Time.mp421.14MB
Lesson 1 Introduction to Web Application Penetration Testing/006. 1.5 Exploring What Programming Languages You Should Know.mp426.3MB
Lesson 2 Overview of Web Applications for Security Professionals/001. Learning objectives.mp48.74MB
Lesson 2 Overview of Web Applications for Security Professionals/002. 2.1 Understanding the Web Application Protocols.mp436.37MB
Lesson 2 Overview of Web Applications for Security Professionals/003. 2.2 Exploring the HTTP Request and Response.mp425.1MB
Lesson 2 Overview of Web Applications for Security Professionals/004. 2.3 Surveying Session Management and Cookies.mp435.83MB
Lesson 2 Overview of Web Applications for Security Professionals/005. 2.4 Introducing DevOps.mp412.83MB
Lesson 2 Overview of Web Applications for Security Professionals/006. 2.5 Exploring Cloud Services.mp421.4MB
Lesson 2 Overview of Web Applications for Security Professionals/007. 2.6 Exploring Web Application Frameworks.mp413.59MB
Lesson 2 Overview of Web Applications for Security Professionals/008. 2.7 Surveying Docker Containers.mp430.97MB
Lesson 2 Overview of Web Applications for Security Professionals/009. 2.8 Introducing Kubernetes.mp415.63MB
Lesson 3 Build Your Own Web Application Lab/001. Learning objectives.mp49.37MB
Lesson 3 Build Your Own Web Application Lab/002. 3.1 Exploring Kali Linux.mp483.14MB
Lesson 3 Build Your Own Web Application Lab/003. 3.2 Introducing Vulnerable Applications.mp49.09MB
Lesson 3 Build Your Own Web Application Lab/004. 3.3 Surveying DVWA.mp48.77MB
Lesson 3 Build Your Own Web Application Lab/005. 3.4 Surveying WebGoat.mp410.69MB
Lesson 3 Build Your Own Web Application Lab/006. 3.5 Surveying Hackazon.mp415.89MB
Lesson 3 Build Your Own Web Application Lab/007. 3.6 Exploring the Web Security Dojo.mp417.26MB
Lesson 3 Build Your Own Web Application Lab/008. 3.7 Understanding Web Application Proxies.mp417.31MB
Lesson 3 Build Your Own Web Application Lab/009. 3.8 Understanding Cyber Ranges and Capture the Flag Events.mp421.35MB
Lesson 4 Reconnaissance and Profiling Web Applications/001. Learning objectives.mp410.46MB
Lesson 4 Reconnaissance and Profiling Web Applications/002. 4.1 Understanding Passive vs. Active Reconnaissance.mp432.08MB
Lesson 4 Reconnaissance and Profiling Web Applications/003. 4.2 Using Search Engines and Public Information.mp423.76MB
Lesson 4 Reconnaissance and Profiling Web Applications/004. 4.3 Exploring Shodan, Maltego, Recon-NG, SpiderFoot, and TheHarvester.mp478.5MB
Lesson 4 Reconnaissance and Profiling Web Applications/005. 4.4 Exploring CMS and Framework Identification.mp419.81MB
Lesson 4 Reconnaissance and Profiling Web Applications/006. 4.5 Surveying Web Crawlers and Directory Brute Force.mp424.29MB
Lesson 4 Reconnaissance and Profiling Web Applications/007. 4.6 Understanding How Web Application Scanners Work.mp49.46MB
Lesson 4 Reconnaissance and Profiling Web Applications/008. 4.7 Introducing Nikto.mp416.92MB
Lesson 4 Reconnaissance and Profiling Web Applications/009. 4.8 Introducing the Burp Suite.mp484.33MB
Lesson 4 Reconnaissance and Profiling Web Applications/010. 4.9 Introducing OWASP Zed Application Proxy (ZAP).mp434.73MB
Lesson 4 Reconnaissance and Profiling Web Applications/011. 4.10 Introducing OpenVAS.mp441.07MB
Lesson 5 Authentication and Session Management Vulnerabilities/001. Learning objectives.mp44.98MB
Lesson 5 Authentication and Session Management Vulnerabilities/002. 5.1 Understanding Authentication Schemes in Web Applications and Related Vulnerabilities.mp4106.36MB
Lesson 5 Authentication and Session Management Vulnerabilities/003. 5.2 Exploring Session Management Mechanisms and Related Vulnerabilities.mp469.86MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/001. Learning objectives.mp46.58MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/002. 11.1 Understanding the Other Common Security Flaws in Web Applications.mp425.51MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/003. 11.2 Exploiting Insecure Direct Object References and Path Traversal.mp447.69MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/004. 11.3 Surveying Information Disclosure Vulnerabilities.mp49.81MB
Lesson 11 Additional Web Application Security Vulnerabilities and Attacks/005. 11.4 Fuzzing Web Applications.mp447.36MB