Lesson 06: File Inclusion, File Upload and SQL Injection (Lesson 06 of Web Penetration Testing Series)
From 83.43 $ /h
This lesson is the sixth lesson of the Web Application Penetration Testing series. This lesson is going to cover the following topics:
- File Inclusion
- Types of Inclusion
- Inclusion in Web Development Languages
- File Upload
- Unrestricted File Upload
- Risk Factors
- Protection and Bypassing Methods
- Prevention Methods
- SQL Injection
This lesson will be followed by 02 hours of the practical lab session.
- File Inclusion
- Types of Inclusion
- Inclusion in Web Development Languages
- File Upload
- Unrestricted File Upload
- Risk Factors
- Protection and Bypassing Methods
- Prevention Methods
- SQL Injection
This lesson will be followed by 02 hours of the practical lab session.
Extra information
A personal laptop/pc is required with Oracle Virtual Box and Kali Linux pre-installed. Good internet connection and device memory is recommended.
Location
At student's location :
- Around Glasgow, United Kingdom
At teacher's location :
- Almada Street, Hamilton, Scotland, UK
Online from United Kingdom
About Me
I am working as a Lecturer (Assistant Professor) in Cyber Security, in one of a renowned university here in Scotland, the UK. I am associated with the Higher Education Academy (HEA) UK as a full Fellow. Additionally, I am associated with Kingston University London as an External Examiner for their undergraduate courses in Cybersecurity, Digital Forensics, Computer Sciences, and Multimedia Technology. I am also associated with the University of London as a Course Mentor/Tutor for their distance learning/online undergraduate courses in Computer Sciences. I am specialized in Digital Authentication and Security, Command and Control Systems (C2/C3/C4i) Security, and Cloud Computing Hybrid Authentication. I am also the Founder and CEO of Security Essential Scientific Research and Training group (SESRT) in Sydney, Australia. I have earned my PhD in Computer Science with specialization in Cyber Security from University Technology Malaysia (UTM). I am an active member of IEEE, an Academic Initiative member for IBM (UK), Authorized Profile Administrator (APA) for IBM Partner-World (UK), member of American Association of Science and Technology (AASCIT) US, and a member of International Association of Science and Technology for Development (IASTED) Canada. I have collaborations with Cyber Security Group in Coventry University (UK), Pervasive Computing Group in University Technology Malaysia, Artificial Intelligence Center for Advanced System (CAS) and Center of Excellence in Information Assurance (CoEIA) in King Saud University, Saudi Arabia. I am currently supervising Postgraduate (PhD/M.Sc.) students and Undergraduate study project students as their primary supervisor here in UWS. I am also serving as an Editor and Reviewer to many ISI/SCI-E highly ranked Journals and Flagship Conferences.
Education
Postgraduate Certificate in Academic Practice from the University of the West of Scotland (UK), PhD (Computer Sciences) from University Technology Malaysia (Malaysia), and an M.Sc. and Bachelors in Computer Sciences.
Experience / Qualifications
With a PhD in Computer Sciences and more than 16 years of teaching and research experience in Computer Sciences, Software Engineering and Cyber Security, I am a Postgraduate Certified in Academic Practice (UK) and a Full Fellow of Higher Education Academy (UK).
Age
Teenagers (13-17 years old)
Adults (18-64 years old)
Seniors (65+ years old)
Student level
Beginner
Intermediate
Duration
60 minutes
90 minutes
120 minutes
The class is taught in
English
Skills
Reviews
Availability of a typical week
(GMT -05:00)
New York
Mon
Tue
Wed
Thu
Fri
Sat
Sun
00-04
04-08
08-12
12-16
16-20
20-24
This lesson is the fifth lesson of the Web Penetration Testing Series. This lesson consist of the following topics:
- Cryptography Overview
- Modern Cryptography
- Steganography v/s Cryptography
- Encoding and Decoding
- Symmetric v/s Asymmetric Cryptography
- Message Authentication and Hashing
This lesson is followed by a two hours practical lab session.
- Cryptography Overview
- Modern Cryptography
- Steganography v/s Cryptography
- Encoding and Decoding
- Symmetric v/s Asymmetric Cryptography
- Message Authentication and Hashing
This lesson is followed by a two hours practical lab session.
The digital landscape is evolving at an unprecedented rate, and cyber threats lurk around every corner. Cybersecurity resilience in the modern world cannot be just an add-on - it's a necessity. Offensive security professionals like ethical hackers and penetration testers can help proactively discover unknown threats and address them before the cybercriminals do.
This Cisco Certified Ethical Hacker course is designed to equip you with an Ethical Hacker skillset and provide a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies. Follow an engaging gamified narrative throughout the course and get lots of practice with hands-on labs inspired by real-world scenarios.
After completing this course, continue your cybersecurity career in offensive security as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyse, and respond to current security threats.
**** Module Covered ****
+ Module 1: Introduction to Ethical Hacking and Penetration Testing
+ Module 2: Planning and Scoping a Penetration Testing Assessment
+ Module 3: Information Gathering and Vulnerability Scanning
+ Module 4: Social Engineering Attacks
+ Module 5: Exploiting Wired and Wireless Networks
+ Module 6: Exploiting Application-Based Vulnerabilities
+ Module 7: Cloud, Mobile, and IoT Security
+ Module 8: Performing Post-Exploitation Techniques
+ Module 9: Reporting and Communication
+ Module 10: Tools and Code Analysis
+ Final Capstone Activity
** Module Exams: 10 Module Exams
** Final Course Exam: 01 Final Course Exam
** Approximately 70 hours of training.
This Cisco Certified Ethical Hacker course is designed to equip you with an Ethical Hacker skillset and provide a solid understanding of offensive security. You will become proficient in the art of scoping, executing, and reporting on vulnerability assessments, while recommending mitigation strategies. Follow an engaging gamified narrative throughout the course and get lots of practice with hands-on labs inspired by real-world scenarios.
After completing this course, continue your cybersecurity career in offensive security as an ethical hacker or penetration tester. Or use this course to strengthen your defensive security knowledge. By understanding the mindset of threat actors, you will be able to more effectively implement security controls and monitor, analyse, and respond to current security threats.
**** Module Covered ****
+ Module 1: Introduction to Ethical Hacking and Penetration Testing
+ Module 2: Planning and Scoping a Penetration Testing Assessment
+ Module 3: Information Gathering and Vulnerability Scanning
+ Module 4: Social Engineering Attacks
+ Module 5: Exploiting Wired and Wireless Networks
+ Module 6: Exploiting Application-Based Vulnerabilities
+ Module 7: Cloud, Mobile, and IoT Security
+ Module 8: Performing Post-Exploitation Techniques
+ Module 9: Reporting and Communication
+ Module 10: Tools and Code Analysis
+ Final Capstone Activity
** Module Exams: 10 Module Exams
** Final Course Exam: 01 Final Course Exam
** Approximately 70 hours of training.
Show more
Good-fit Instructor Guarantee







