Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Broken Access Control
Showing:
10
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
How to Hack OWASP Juice Shop - A Guided Walkthrough Showing All Solutions
0
rewiews
Comprehensive guide to mastering OWASP Juice Shop's vulnerabilities, covering all challenges from basic to advanced levels with detailed solutions and explanations.
Add to list
50
Lesons
7 hours
On-Demand
Free-Video
Cyber Mentor
Beginner Web Application Hacking
0
rewiews
Comprehensive introduction to web application hacking, covering enumeration, XSS, SQL injection, broken access control, and more. Includes live bug bounty hunting demonstration.
Add to list
6
Lesons
5 hours 8 minutes
On-Demand
Free-Video
Cyber Mentor
Web Application Pentesting
0
rewiews
Learn comprehensive web application penetration testing techniques, from enumeration to advanced exploits, with hands-on practice and real-world bug bounty hunting scenarios.
Add to list
7
Lesons
12 hours
On-Demand
Free-Video
HackerOne
A Starters Guide to Pentesting with OWASP
0
rewiews
Learn essential web security concepts, OWASP Top 10 vulnerabilities, and practical pentesting techniques to enhance your cybersecurity skills and protect web applications effectively.
Add to list
15
Lesons
26 minutes
On-Demand
Free-Video
Cyber Mentor
Web App Testing - XXE, Input Validation, Broken Access Control, and More XSS
0
rewiews
Explore advanced web app testing techniques including XXE, input validation, broken access control, and XSS. Enhance your ethical hacking skills and learn to identify critical vulnerabilities.
Add to list
1
Lesons
1 hour 57 minutes
On-Demand
Free-Video
LASCON
OWASP Top 10 2017 - Security Vulnerabilities A4 to A8 - Part 3 of 5
0
rewiews
Explore OWASP Top 10 vulnerabilities A4 to A8, gaining insights into critical web application security risks and effective mitigation strategies.
Add to list
1
Lesons
1 hour 18 minutes
On-Demand
Free-Video
Serverless Security Top 10
0
rewiews
Explore top 10 serverless security risks, their impact, and mitigation strategies. Gain insights into cloud evolution and emerging vulnerabilities in serverless architectures.
Add to list
12
Lesons
52 minutes
On-Demand
Free-Video
ACCU Conference
Common Webapp Vulnerabilities and What to Do About Them
0
rewiews
Explore common web app vulnerabilities and practical mitigations based on the OWASP Top 10 List, focusing on injection attacks, authentication issues, and data exposure risks.
Add to list
15
Lesons
1 hour 30 minutes
On-Demand
Free-Video
NDC Conferences
What Happens if I Change This URI - Oooooh
0
rewiews
Explore broken access control vulnerabilities, their impact, prevention methods, and efficient testing techniques in web applications.
Add to list
1
Lesons
55 minutes
On-Demand
Free-Video
NashKnolX
OWASP Top Ten - Understanding and Mitigating Critical Web Application Security Risks
0
rewiews
Explore critical web application security risks, learn to identify and mitigate vulnerabilities, and integrate OWASP ZAP with Selenium for enhanced protection.
Add to list
17
Lesons
49 minutes
On-Demand
Free-Video
load more...