Web Application security | Web Application Security Gurgaon | Web Application Security Courses in Lucknow
Lecture 40
Duration 40 Hrs
Skill Level All
Language English
Assessments Online
Web Applications are the core of internet services. Billions of websites across the world hold highly critical information regarding the firm, the employees, the customers and their products. This course is a practical guide on how web applications are hacked, data breaches take place and how to prevent them. All common attacks SQL Injection, Cross Site Scripting, CSRF etc are covered. This course also covers the Pentesting standards like OWASP, SANS etc.
Takeaways for the students.

Industry recognised certification as "Information Security Certified Professional."
Training under Kratikal Certified Instructor.
Live security testiong (VA)
projects under kratikal.
Course Material, Video, Lectures
and DVD toolkit.
Regular assessments and
skill checks.
Lifetime access to E-learning
portal.
  • What is Cyber Security
  • Statistics and Inferences
  • Need of Cyber Security
  • Common Terminologies
  • Career and Growth
  • Threats to the Cyber World
  • Hacking Phases
  • Skills of an Ethical hacker
  • Introduction
  • Need of Footprinting
  • Targets of Footprinting
  • Footprinting Techniques
  • Conclusion
  • Introduction
  • Types of scanning
  • Objectives of scanning techniques
  • Port Scanning Techniques
  • Port scanner tools
  • Vulnerability Scanning
  • Determining Network Architecture
  • Conclusion
  • Basics of Web Application
  • Passive Information Gathering
  • Active Information Gathering
  • Check Authentication Mechanism
  • Vulnerabilities in Authorization Mechanism
  • Injection Attacks
  • Web Application Vulnerabilities and its Defenses
  • Web Application Security Scanner
  • SQL Injection
  • LDAP Injection
  • ORM Injection
  • XML Injection
  • SSI Injection
  • Injection Attacks
  • XPath Injection
  • IMAP/SMTP Injection
  • Code Injection
  • File inclusion vulnerabilities
  • Command Injection
  • How to prevent SQL Injection
  • Conclusion
  • Introduction
  • Penetration testing
  • Vulnerability Assessment vs Penetration testing
  • Legal Authority
  • Importance of Penetration testing
  • Advantages of Pentesting
  • Methods of Pentesting
  • Penetration Testing Execution Standard
  • Stages of Pentesting
  • Reporting
Still have doubts? Talk to our counsellor
Contact Us
Accredited By

Alumnus of Kratikal working at