This course Secnic Certified Software Security practitioner suite (SCSSPS) educates the developers on the best way to exploit (hack) and shield against different assaults on Programming dialect. The course is composed around OWASP Top10 which is normal standard which is utilized as a part of configuration, engineering, testing of web applications.
The course contains video/sound addresses. It has Theory on programming (Exploit, Defence) . It likewise has Demos of abuse and Defence. It gives understudies common sense understanding into coding web application in PHP safely.
We prescribe understudies to examine the course over a time of 15 days and endeavour the test toward the end of the period. We likewise prescribe understudies to concentrate on different asset material accessible on the web in different gatherings including OWASP official site.
The course is organized by Top 10 from A1 to A10. In each of the OWASP Top10 sessions we have ordered presentation, abuse, protection.
Any developer, who is modifying in any language, ought to take this course. Secure software developers are preferred by associations over the globe.
What are the necessities?
- essential programming in .NET, PHP, JAVA, PYTHON, RUBY
- online programming dialect
What am I going to get from this course?
- More than 66 addresses and 4 hours of substance!
- Figure out how to Hack and Write Secure code
- Take in the OWASP Top10 Methodology A1 – A10
- Apply the above OWASP Top10 approach on any programming
What is the intended interest group?
- Software engineers who code in .NET, PHP, JAVA, PYTHON, RUBY
- Plan Engineers, Architects who outline or design for based projects
- Security analysers and Functional analysers who test based projects
Section 1: Injection(A1) – OWASP Top10 | ||
Lecture 1 | Injection – OWASP Top10 (A1) – Presentation | |
Lecture 2 | Blind SQL Injection Presentation | |
Lecture 3 | SQLI | |
Lecture 4 | Time based SQLI | |
Lecture 5 | Union Exploitation Technique | |
Lecture 6 | SQL Injection Union – Demo – Exploitation | |
Lecture 7 | Preventing SQLI | |
Lecture 8 | SQL Injection Login Bypass – Demo | |
Lecture 9 | SQL Injection – Demo – Defense | |
Section 2: Injection(A1) – Command Injection | ||
Lecture 10 | Command Injection Presentation | |
Lecture 11 | Command Injection – Demo | |
Lecture 12 | Command Injection Prevention – Demo | |
Section 3: Injection(A1) – XML & XPath Injection | ||
Lecture 13 | XML & XPath Injection Presentation | |
Lecture 14 | XPath Injection – Demo | |
Lecture 15 | XPath Injection Prevention – Demo | |
Section 4: Injection(A1) – PHP Code Injection | ||
Lecture 16 | PHP Code Injection Presentation | |
Lecture 17 | PHP Code Injection Demo | |
Lecture 18 | PHP Code Injection Prevention | |
Section 5: Injection(A1) – PHP Object Injection | ||
Lecture 19 | PHP Object Injection Presentation | |
Lecture 20 | PHP Object Injection Demo 1 | |
Lecture 21 | PHP Object Injection Demo 2 | |
Lecture 22 | PHP Object Injection Prevention | |
Section 6: Injection(A1) – SSI Injection | ||
Lecture 23 | SSI Injection Presentation | |
Lecture 24 | SSI Injection Demo | |
Lecture 25 | SSI Injection Prevention | |
Section 7: Injection(A1) – LDAP Injection | ||
Lecture 26 | LDAP Injection Presentation | |
Section 8: Injection(A1) – HTML Injection | ||
Lecture 27 | HTML Injection Presentation | |
Lecture 28 | HTML Injection Demo | |
Section 9: Broken Authentication and Session Management(A2) – OWASP Top10 | ||
Lecture 29 | Broken Authentication and Session Management – OWASP Top10(A2) – Presentation | |
Lecture 30 | Broken Authentication and Session Management – Demo – Exploit | |
Lecture 31 | Defense Demo | |
Section 10: Cross-Site Scripting (XSS) – A3 – OWASP Top10 | ||
Lecture 32 | Cross Site Scripting(XSS) – Introduction | |
Lecture 33 | Cross Site Scripting – Reflected | |
Lecture 34 | Cross Site Scripting – Demo – Reflected – Get | |
Lecture 35 | Cross Site Scripting(XSS) – Demo – Reflected – Post | |
Lecture 36 | Cross Site Scripting(XSS) Stored – Presentation | |
Lecture 37 | Cross Site Scripting(XSS) – Demo – Stored | |
Section 11: Cross Site Scripting – A3 – Defense | ||
Lecture 38 | Cross-Site Scripting (XSS) – OWASP Top10 – Presentation – Defence | |
Lecture 39 | Cross-Site Scripting (XSS) – FIlters | |
Lecture 40 | Cross Site Scripting(XSS) – HTTP Flag | |
Lecture 41 | Cross Site Scripting – Demo – Modsecurity | |
Section 12: Insecure Direct Object References – A4 – OWASP Top10 | ||
Lecture 42 | Insecure Direct Object Reference – OWASP Top10 – A4 – Presentation | |
Lecture 43 | Insecure Direct Object Reference -DEMO- Exploitation | |
Lecture 44 | Insecure Direct Object Reference – Demo – Defense | |
Section 13: Security Misconfiguration – A5 – OWASP Top10 | ||
Lecture 45 | Security Misconfiguration – OWASP Top10 – A5 – Presentation | |
Lecture 46 | Security Misconfiguration – Demo – Exploit | |
Lecture 47 | Security Misconfiguration – Demo – Defense | |
Section 14: Sensitive Data Exposure – A6 – OWASP Top10 | ||
Lecture 48 | Sensitive Data Exposure – OWASP Top10 – A6 – Presentation | |
Lecture 49 | Sensitive Data Exposure – A6 – Demo – Exploit | |
Lecture 50 | Sensitive Data Exposure – A6 – Demo – Defense | |
Section 15: Missing Function Level Access Control – A7 – OWASP Top10 | ||
Lecture 51 | Missing Function Level Access Control – OWASP Top10 – A7 – Presentation | |
Lecture 52 | Missing Function Level Access Control – Demo – Exploitation(1) | |
Lecture 53 | Missing Function Level Access Control – Demo – Exploitation(2) | |
Lecture 54 | Missing Function Level Access Control – Demo – Defence | |
Section 16: Cross-Site Request Forgery (CSRF) – A8 – OWASP Top10 | ||
Lecture 55 | Cross-Site Request Forgery (CSRF) – OWASP Top10 – A8 – Presentation | |
Lecture 56 | Cross-Site Request Forgery (CSRF) – OWASP Top10 – A8 – Defense Presentation | |
Lecture 57 | CSRF – Demo – Get Exploit | |
Lecture 58 | CSRF – Demo – Get Defence | |
Lecture 59 | CSRF – Demo – Post Exploit | |
Lecture 60 | CSRF – Demo – Post Defence | |
Section 17: Using Components with Known Vulnerabilities – A9 – OWASP Top10 | ||
Lecture 61 | Using Components with Known Vulnerabilities – OWASP top10 – A9 – Presentation | |
Lecture 62 | Using components with Known Vulnerabilities – A9 – Demo | |
Section 18: Unvalidated Redirects and Forwards – A10 – OWASPTop10 | ||
Lecture 63 | Unvalidated Redirects and Forwards – OWASP Top10 – A10 – Presentation | |
Lecture 64 | Unvalidated Redirects and Forwards – OWASP Top10 – A10 – Presentation Defense | |
Lecture 65 | Unvalidated Redirects and Forwards – Demo – Exploit | |
Lecture 66 | Unvalidated Redirects and Forwards – Demo – Defense | |
Section 19: Certification |