Companies Home Search Profile

Mastering the OWASP Top 10 Vulnerabilities ~2023

Focused View

Foyzul Islam

14:15:09

212 View
  • 1 - Introduction.html
  • 2 - Burp Suite.mp4
    07:08
  • 3 - more.mp4
    25:26
  • 4 - All methods.mp4
    25:11
  • 5 - Vulnerable Authentication Logic.mp4
    13:44
  • 6 - Multifactor Authentication.mp4
    29:07
  • 7 - File path traversal.mp4
    13:24
  • 8 - Traversal sequences blocked.mp4
    10:32
  • 9 - Stripped nonrecursively.mp4
    11:19
  • 10 - Stripped with superfluous URLdecode.mp4
    13:11
  • 11 - Advanced Directory traversal.mp4
    10:49
  • 12 - Null byte bypass.mp4
    07:50
  • 13 - Before Start.mp4
    10:23
  • 14 - Lab 01.mp4
    16:35
  • 15 - Lab 02.mp4
    15:38
  • 16 - Get Access everything.mp4
    17:07
  • 17 - Advanced Lab.mp4
    04:08
  • 18 - Lab 1.mp4
    14:07
  • 19 - Lab 2.mp4
    14:55
  • 20 - Lab 3.mp4
    18:59
  • 21 - Lab 4.mp4
    13:06
  • 22 - Lab 1.mp4
    10:59
  • 23 - Lab 2.mp4
    05:50
  • 24 - Lab 3.mp4
    09:57
  • 25 - Lab 5.mp4
    13:13
  • 26 - Lab 7.mp4
    04:03
  • 27 - Lab 8.mp4
    07:59
  • 28 - Lab 1.mp4
    13:05
  • 29 - Lab 2.mp4
    09:19
  • 30 - Lab 3.mp4
    08:57
  • 31 - Lab 4.mp4
    11:53
  • 32 - Lab 5.mp4
    10:54
  • 33 - Web Shell Upload via Remote Code.mp4
    10:14
  • 34 - Bypass ContentType.mp4
    13:37
  • 35 - Upload web shell via path traversal.mp4
    18:59
  • 36 - Extension bypass method.mp4
    18:23
  • 37 - Advanced Method.mp4
    10:07
  • 38 - Advanced Method 2.mp4
    26:24
  • 39 - Lab 1.mp4
    10:31
  • 40 - Lab 2.mp4
    16:46
  • 41 - Lab 3.mp4
    08:20
  • 42 - Lab 4.mp4
    23:31
  • 43 - Lab 5.mp4
    17:59
  • 44 - Lab 6.mp4
    41:40
  • 45 - Lab 7.mp4
    44:01
  • 46 - Lab 8.mp4
    23:06
  • 47 - Basic SSRF.mp4
    09:23
  • 48 - Blacklistbased input filter.mp4
    15:38
  • 49 - SSRF filter bypass.mp4
    14:38
  • 50 - Blind SSRF.mp4
    11:01
  • 51 - Advanced Method.mp4
    15:10
  • 52 - XXE using external entities.mp4
    09:58
  • 53 - Exploiting XXE.mp4
    07:24
  • 54 - Blind XXE with outofband.mp4
    06:49
  • 55 - Blind XXE via XML parameter.mp4
    12:30
  • 56 - Exploiting XXE via image.mp4
    10:21
  • 57 - Reflected XSS.mp4
    05:14
  • 58 - Stored XSS.mp4
    09:54
  • 59 - DOMbased XSS.mp4
    04:20
  • 60 - Lab 01.mp4
    04:56
  • 61 - Lab 02.mp4
    09:34
  • 62 - Lab 03.mp4
    11:47
  • 63 - Lab 04.mp4
    05:39
  • 64 - RealWorld Examples.mp4
    05:45
  • 65 - Its me.mp4
    02:42
  • Description


    Vulnerabilities in OWASP Top 10:- Understanding, Detecting, and Preventing | Learn with Fun way

    What You'll Learn?


    • OWASP Top 10
    • SQL Injection
    • Cross site Scripting
    • Upload Vulnarebility
    • About Authentication vulnerabilities
    • Weak Login Credentials
    • Unsecure Password Change and Recovery
    • Flawed Two-Factor Authentication
    • OS Command Injection
    • Blind OS command Injection Vulnerabilities
    • Detecting Blind OS Injection Vulnerabilities
    • About Payload
    • Access files and Directories that are stored outside the web root folder
    • About The vulnerable code
    • Access arbitrary files and directories stored on the filesystem
    • Business logic vulnerabilities ~ Everything
    • Application logic vulnerabilities ~Erverything
    • 2FA broken logic
    • Password & 2FA bypass
    • Authentication bypass via information disclosure
    • Unnecessarily exposing highly sensitive information, such as credit card details
    • Hard-coding API keys, IP addresses, database credentials, and so on in the source code
    • About Access Control vulnerabilities
    • Admin Functionality
    • Method-based access control
    • URL-based access control
    • login bypass
    • Blind SQL injection
    • Injections via filename
    • SSRF via filename
    • Third-party vulnerabilities
    • File upload race condition
    • Basic SSRF
    • Blind SSRF
    • File-based SSRF
    • Parameter-based SSRF
    • Types of Cross-Site Scripting
    • Advanced Cross-Site Scripting Techniques
    • Detecting and Exploiting Cross-Site Scripting

    Who is this for?


  • Anyone interested in web security
  • How Wants to be Bug Bounty Hunter
  • How wants to practice OWASP Top 10
  • How Loves Web Application penetration testing
  • Ethical hackers
  • Cybersecurity professionals
  • Penetration testers
  • How wants to Learn Authentication vulnerabilities
  • How wants to Learn SQL Injection
  • How wants to learn Password & 2FA bypass
  • Who wants to be master about Information disclosure vulnerabilities
  • Who wants to Learn File upload vulnerabilities
  • Increased knowledge and understanding of SSRF vulnerabilities
  • More details


    Description

    Cybersecurity is more important than ever, and one of the most critical aspects of securing an application or website is understanding the most common vulnerabilities attackers exploit. In this course, you'll learn how to identify and mitigate the OWASP Top 10 vulnerabilities, a list of the most critical web application security risks identified by the Open Web Application Security Project (OWASP).


    The OWASP Top 10 provides rankings of—and remediation guidance for—the top 10 most critical web application security risks. Leveraging the extensive knowledge and experience of the OWASP's open community contributors, the report is based on a consensus among security experts from around the world.

    Your instructor for this course is a seasoned security professional with years of experience identifying and mitigating OWASP TOP 10 vulnerabilities. They'll provide you with step-by-step guidance and practical advice to help you become an expert in OWASP.


    Course Objectives:

    • Understand the most critical web application security risks

    • Learn how to identify vulnerabilities in your applications

    • Understand how to mitigate these vulnerabilities to secure your applications and data

    • Get hands-on experience with tools and techniques for identifying and mitigating vulnerabilities


    Course Structure:

    The course is divided into 10 modules, each focusing on one of the OWASP Top 10 vulnerabilities. Each module will include video lectures, practical exercises, and quizzes to test your understanding of the material. You'll also have access to additional resources, including cheat sheets, reference guides, and a community of fellow students and instructors.


    Module Overview:

    1. Injection Attacks: Learn about SQL injection, NoSQL injection, and other injection attacks and how to prevent them.

    2. Broken Authentication and Session Management: Understand the risks of weak authentication and session management, and learn how to prevent attacks like brute force, session hijacking, and cross-site request forgery.

    3. Cross-Site Scripting (XSS): Learn about different types of XSS attacks, how they work, and how to prevent them.

    4. Insecure Direct Object References: Understand the risks of direct object references and learn how to mitigate them.

    5. Security Misconfiguration: Learn how to avoid common configuration errors that can lead to security vulnerabilities.

    6. Sensitive Data Exposure: Understand the risks of exposing sensitive data, and learn how to protect it.

    7. Insufficient Attack Protection: Learn about different types of attacks, and how to protect your applications from them.

    8. Cross-Site Request Forgery (CSRF): Understand what CSRF attacks are, how they work, and how to prevent them.

    9. Using Components with Known Vulnerabilities: Learn how to identify and manage vulnerabilities in third-party components and libraries.

    10. Insufficient Logging and Monitoring: Understand why logging and monitoring are essential for detecting and responding to attacks, and learn how to set up effective logging and monitoring practices.


    When you enroll in this course, you'll receive access to the following materials:

    1. Video lectures: You'll have access to over 10 hours of video lectures covering all aspects of SSRF vulnerabilities.

    2. Course notes: You'll receive a comprehensive set of course notes that cover all the material covered in the lectures.

    3. Practical exercises: You'll have the opportunity to practice identifying and exploiting SSRF vulnerabilities in a safe testing environment.

    4. Quizzes: You'll have access to quizzes to test your knowledge and reinforce what you've learned.

    5. Certificate of completion: Once you complete the course, you'll receive a certificate of completion that you can add to your resume or LinkedIn profile.


    Course Benefits:

    • Understand the most common web application security risks

    • Gain hands-on experience with tools and techniques for identifying and mitigating vulnerabilities

    • Learn how to secure your applications and data from attack

    • Boost your career prospects with a valuable cybersecurity skillset


    Is this course for me?

    This course is designed for developers, security professionals, and anyone who is interested in web application security. Whether you're a beginner or an experienced professional, this course will provide you with the knowledge and skills you need to identify and mitigate OWASP TOP 10 vulnerabilities.


    Enroll now to master the OWASP Top 10 vulnerabilities and take your cybersecurity skills to the next level!

    Who this course is for:

    • Anyone interested in web security
    • How Wants to be Bug Bounty Hunter
    • How wants to practice OWASP Top 10
    • How Loves Web Application penetration testing
    • Ethical hackers
    • Cybersecurity professionals
    • Penetration testers
    • How wants to Learn Authentication vulnerabilities
    • How wants to Learn SQL Injection
    • How wants to learn Password & 2FA bypass
    • Who wants to be master about Information disclosure vulnerabilities
    • Who wants to Learn File upload vulnerabilities
    • Increased knowledge and understanding of SSRF vulnerabilities

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Foyzul Islam
    Foyzul Islam
    Instructor's Courses
    My name is Paplu Ahmed, I am an Ethical Hacker, Programmer and CTF Lover. I just love hacking and breaking the rules, but don’t get me wrong as I said I am an ethical hacker.Paplu Ahmed is a Penetration Tester with over 4 years of experience in Ethical Hacking and Problem Solving. He started learning hacking and programming on his own from a young age. Now he is working successfully on popular sites like HackerOne, bugCrowed, ctftime, hackerrank, codeforces.As a tutor, he joined Udemy, the world's largest online learning platform, in 2023. He joined as an instructor to spread his experience and skills among the people. Prior to this, he has been teaching offline for more than 1.5 year
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 64
    • duration 14:15:09
    • Release Date 2023/04/27