You are on page 1of 3

Course Syllabus

Web Application Penetration Testing

Instructor Name: Raymond Evans, Cydefe

Instructor Website: http://www.cydefe.com/

Course Creation Date: 12/04/2014

Course Description and Goals

Course Description: In this course, SME, Raymond Evans, takes you on a wild and fascinating
journey into the cyber security discipline of web application pentesting. This is a very hands-on
course that will require you to set up your own pentesting environment.

Study Resources: All study resources will be provided in the “Resources” section of the
course.

Course Goals: By the end of this course, students should be able to:

❏ Understand HTTP
❏ SQL Injections
❏ Cross site scripting (XSS)
❏ LFI & RFI
❏ How to write a report?

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.

1
Course Outline

Module 1 | Introduction, HTTP Basics and Why sites get hacked?


Lesson 1.1: Introduction (02:00)
Lesson 1.2: Tools (08:00)
Lesson 1.3: Packets (10:00)
Lesson 1.4: HTTP Basics (10:00)
Lesson 1.5: Why Sites Get Hacked - 1(08:00)
Lesson 1.6: Why Sites Get Hacked - 2(12:00)
Lesson 1.7: Why Sites Get Hacked - 3(07:00)
Lesson 1.8: Why Sites Get Hacked - 4(05:00)
Lesson 1.9: Why Sites Get Hacked - 5(03:00)
Lesson 1.10: Best Practices – 1 (08:00)
Lesson 1.11: Best Practices - 2 (05:00)
Lesson 1.12: Environment Setup (10:00)

Module 2 | SQL Injection


Lesson 2.1: What is SQL Injection (09:00)
Lesson 2.2: Spidering – 1 (03:00)
Lesson 2.3: Spidering – 2 (05:00)
Lesson 2.4: Spidering – 3 (03:00)
Lesson 2.5: Spidering – 4 (02:00)
Lesson 2.6: Discovering SQLI - 1 (02:00)
Lesson 2.7: Discovering SQLI – 2 (06:00)
Lesson 2.8: Discovering SQLI - 3(06:00)
Lesson 2.9: Discovering SQLI - 4(02:00)
Lesson 2.10: Discovering SQLI -5 (04:00)
Lesson 2.11: Discovering SQLI - 6 (08:00)
Lesson 2.12: Exploiting SQLI – 1 (05:00)
Lesson 2.13: Exploiting SQLI – 2 (03:00)
Lesson 2.14: Exploiting SQLI – 3 (03:00)
Lesson 2.15: Exploiting SQLI – 4 (04:00)
Lesson 2.16: SQLI Lab (01:00)

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.

2
Module 3 | Cross Site Scripting (XSS)
Lesson 3.1: What is XSS-1 (10:00)
Lesson 3.2: What is XSS-2 (03:00)
Lesson 3.3: Discovering XSS - 1(04:00)
Lesson 3.4: Discovering XSS - 2 (05:00)
Lesson 3.5: Discovering XSS - 3 (05:00)
Lesson 3.6: Discovering XSS - 4 (05:00)
Lesson 3.7: Discovering XSS - 5 (05:00)
Lesson 3.8: Discovering XSS - 6 (01:00)
Lesson 3.9: Exploiting XSS - 1 (07:00)
Lesson 3.10: Exploiting XSS - 2 (13:00)
Lesson 3.11: XSS Lab (01:00)

Module 4 | LFI & RFI


Lesson 4.1: LFI & RFI -1 (02:00)
Lesson 4.2: LFI & RFI -2 (02:00)
Lesson 4.3: LFI & RFI -3 (05:00)
Lesson 4.4: LFI & RFI Lab (02:00)

Module 5 | Reporting
Lesson 5.1: Report Creation -1 (09:00)
Lesson 5.2: Report Creation -1 (05:00)
Lesson 5.3: Wrap up (01:00)

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.

You might also like