OWASP Top 10: Discovering & Exploiting Web App Vulnerabilities
There are almost two billion web sites in the world today. Many of these sites are not sufficiently protected against attacks. In this course you ll begin by learning how to install a sample vulnerable web application. Next you ll explore how to use reconnAIssance methods such as nmap scanning and web app scanning using OWASP ZAP to discover HTTP hosts and vulnerable applications. You ll learn how to execute attacks including XSS CSRF file injection and denial of service. You ll move on to examine how to capture user keystrokes using a hardware keylogger and capture cleartext HTTP transmissions. Lastly you ll learn how to forge fake TCP/IP packets and then deploy and secure a cloud-hosted web application.