This lesson is the third lesson of the Web Penetration Testing Series. This lesson covers the following topics: - Web Application Security Overview - Security Principles - Attack Anatomy - Threat Modeling - STRIDE Methodology - DREAD Methodology - Attack Trees This lesson is followed by a 02 hours lab practical session.
This lesson is the fifth lesson of the Web Penetration Testing Series. This lesson consist of the following topics: - Cryptography Overview - Modern Cryptography - Steganography v/s Cryptography - Encoding and Decoding - Symmetric v/s Asymmetric Cryptography - Message Authentication and Hashing This lesson is followed by a two hours practical lab session.
This lesson is the fourth lesson of the Web Penetration Testing series. This lesson consist of the following topics: - Command Injection - Code Injection - Blind Xpath Injection - Brute Force - Risk Factors and Examples - Frequency Analysis This lesson is followed by a two hours lab practical session.
This lesson is the sixth lesson of the Web Application Penetration Testing series. This lesson is going to cover the following topics: - File Inclusion - Types of Inclusion - Inclusion in Web Development Languages - File Upload - Unrestricted File Upload - Risk Factors - Protection and Bypassing Methods - Prevention Methods - SQL Injection This lesson will be followed by 02 hours of the practical lab session.
This lesson is the last lesson of the Web Application Penetration Testing Series. The lesson cover the following topics: - Cross-Site Scripting (XSS) - XSS Reflected Attacks - XSS Stored Attacks - Other XSS Vulnerabilities - Protection against XSS Attacks This lesson is followed by two hours of the practical session.
This lesson is the first lesson of the Web Application Penetration Testing series. This lesson is going to provide a complete overview of the series and all the topics covered in this series. Following are the topics which will be covered in this series: - Lesson 02: Web Application Security Architecture - Lesson 03: Web Security Threat Analysis - Lesson 04: Brute Force and Command Injection - Lesson 05: Cryptography and File Inclusion - Lesson 06: SQL Injection My Profile ::: I am working as a Lecturer (Assistant Professor) in Computing and Cybersecurity, with a renowned university in the UK. I am associated as a Full Fellow with the Higher Education Academy (HEA), the UK. Additionally, I am associated with Kingston University London as an External Examiner for their undergraduate courses in Cybersecurity, Digital Forensics, Computer Sciences, and Multimedia Technology. I am also associated with the University of London as a Course Mentor/Tutor for their distance learning/online undergraduate courses in Computer Sciences. I am specialized in Digital Authentication and Security, Command and Control Systems (C2/C3/C4i) Security, and Cloud Computing Hybrid Authentication. I am also the Founder and CEO of Security Essential Scientific Research and Training group (SESRT) in Sydney, Australia. I have earned my PhD in Computer Science with specialization in Cyber Security. I am an active member of IEEE, an Academic Initiative member for IBM (UK), Authorized Profile Administrator (APA) for IBM Partner-World (UK), member of American Association of Science and Technology (AASCIT) US, and a member of International Association of Science and Technology for Development (IASTED) Canada. I have collaborations with Cyber Security Group in Coventry University (UK), Pervasive Computing Group in University Technology Malaysia, Artificial Intelligence Center for Advanced System (CAS) and Center of Excellence in Information Assurance (CoEIA) in King Saud University, Saudi Arabia. I am currently supervising Postgraduate (PhD/M.Sc.) students and Undergraduate study project students as their primary supervisor here in UWS. I am also serving as an Editor and Reviewer to many ISI/SCI-E highly ranked Journals and Flagship Conferences.
This lesson is lesson 02 of the Web Penetration Testing series. It covers the following topics: - Web Application Security Architecture Overview - Web Application Security Architecture Working - Web Application Security Architecture Components - Web Server Architecture - Layered Approach - Service-Oriented Architecture - Cloud Computing - Fog/Edge Computing This lesson is followed by two hours of the practical lab session.
Good-fit Instructor Guarantee
If you are not satisfied after your first lesson, Apprentus will find you another instructor or will refund your first lesson.
- Instructor since July 2020
- Phone number verified
- Twitter connected