Have any questions? +91 7388939769 ankit@kratikal.com

Courses > Web Application Security

Web Application Security Certified Professional

Web Applications are the core of internet services. Billions of websites across the world hold highly critical information regarding the firm, the employees.

1000+ Students Enrolled | 257+ Ratings | English | Online/Offline

Lectures 40
Duration 40 Hrs
Skill Level All
Assessments Online
Web Applications are the core of internet services. Billions of websites across the world hold highly critical information regarding the firm, the employees, the customers and their products. This course is a practical guide on how web applications are hacked, data breaches take place and how to prevent them. All common attacks SQL Injection, Cross Site Scripting, CSRF etc are covered. This course also covers the Pentesting standards like OWASP, SANS etc.
Tools,OS,Frameworks We Use
  • What is Cyber Security
  • Statistics and Inferences
  • Need of Cyber Security
  • Common Terminologies
  • Career and Growth
  • Threats to the Cyber World
  • Hacking Phases
  • Skills of an Ethical hacker
  • Introduction
  • Need of Footprinting
  • Targets of Footprinting
  • Footprinting Techniques
  • Conclusion
  • Introduction
  • Types of scanning
  • Objectives of scanning techniques
  • Port Scanning Techniques
  • Port scanner tools
  • Vulnerability Scanning
  • Determining Network Architecture
  • Conclusion
  • Basics of Web Application
  • Passive Information Gathering
  • Active Information Gathering
  • Check Authentication Mechanism
  • Vulnerabilities in Authorization Mechanism
  • Injection Attacks
  • Web Application Vulnerabilities and its Defenses
  • Web Application Security Scanner
  • SQL Injection
  • LDAP Injection
  • ORM Injection
  • XML Injection
  • SSI Injection
  • Injection Attacks
  • XPath Injection
  • IMAP/SMTP Injection
  • Code Injection
  • File inclusion vulnerabilities
  • Command Injection
  • How to prevent SQL Injection
  • Conclusion
  • Introduction
  • Penetration testing
  • Vulnerability Assessment vs Penetration testing
  • Legal Authority
  • Importance of Penetration testing
  • Advantages of Pentesting
  • Methods of Pentesting
  • Penetration Testing Execution Standard
  • Stages of Pentesting
  • Reporting
Course Curriculum

Other Courses

ISCP - Information Security Certified Professional

Lectures:60 | Duration: 40 Hrs

Mobile Application Security

Lectures:60 | Duration: 40 Hrs

Web Application Security

Lectures:60 | Duration: 40 Hrs

What You Will Get ?

Industry recognized certification

Study Materials, Resources and Books

Software Tool kits

Video Lectures

Lifetime access to
e-learning portal

Live testing projects

Supported and Reviewed By
Accredited and Reviewed By

Alumni Of Kratikal Working At

Still have doubts? Talk to our counsellor