- Intro 1
- Lecture1.1
- Preparation - Creating a Penetration Testing Lab 6
- Lecture2.106 min
- Lecture2.209 min
- Lecture2.309 min
- Lecture2.409 min
- Lecture2.511 min
- Lecture2.605 min
- Preparation - Linux Basics 3
- Lecture3.105 min
- Lecture3.213 min
- Lecture3.304 min
- Website Basics 2
- Lecture4.105 min
- Lecture4.206 min
- Information Gathering 9
- Lecture5.105 min
- Lecture5.206 min
- Lecture5.310 min
- Lecture5.404 min
- Lecture5.507 min
- Lecture5.607 min
- Lecture5.704 min
- Lecture5.808 min
- Lecture5.9
- File Upload Vulnerabilities 6
- Lecture6.107 min
- Lecture6.2
- Lecture6.308 min
- Lecture6.4
- Lecture6.507 min
- Lecture6.606 min
- Code Execution Vulnerabilities 3
- Lecture7.107 min
- Lecture7.206 min
- Lecture7.306 min
- Local File Inclusion Vulnerabilities (LFI) 2
- Lecture8.106 min
- Lecture8.207 min
- Remote File Inclusion Vulnerabilities (RFI) 4
- Lecture9.104 min
- Lecture9.206 min
- Lecture9.303 min
- Lecture9.406 min
- SQL Injection Vulnerabilities 2
- Lecture10.106 min
- Lecture10.203 min
- SQL Injection Vulnerabilities - SQLi In Login Pages 4
- Lecture11.108 min
- Lecture11.205 min
- Lecture11.306 min
- Lecture11.408 min
- SQL injection Vulnerabilities - Extracting Data From The Database 4
- Lecture12.107 min
- Lecture12.205 min
- Lecture12.304 min
- Lecture12.404 min
- SQL injection Vulnerabilities - Advanced Exploitation 11
- Lecture13.1
- Lecture13.207 min
- Lecture13.305 min
- Lecture13.405 min
- Lecture13.509 min
- Lecture13.6
- Lecture13.706 min
- Lecture13.808 min
- Lecture13.907 min
- Lecture13.1003 min
- Lecture13.1105 min
- XSS Vulnerabilities 6
- Lecture14.103 min
- Lecture14.204 min
- Lecture14.305 min
- Lecture14.407 min
- Lecture14.503 min
- Lecture14.604 min
- XSS Vulnerabilities - Exploitation 14
- Lecture15.106 min
- Lecture15.205 min
- Lecture15.306 min
- Lecture15.404 min
- Lecture15.504 min
- Lecture15.604 min
- Lecture15.702 min
- Lecture15.804 min
- Lecture15.907 min
- Lecture15.1010 min
- Lecture15.1107 min
- Lecture15.1207 min
- Lecture15.1304 min
- Lecture15.1407 min
- Insecure Session Management 5
- Lecture16.106 min
- Lecture16.207 min
- Lecture16.307 min
- Lecture16.4
- Lecture16.509 min
- Brute Force & Dictionary Attacks 3
- Lecture17.104 min
- Lecture17.207 min
- Lecture17.314 min
- Discovering Vulnerabilities Automatically Using Owasp ZAP 2
- Lecture18.104 min
- Lecture18.204 min
- Post Exploitation 12
- Lecture19.104 min
- Lecture19.207 min
- Lecture19.308 min
- Lecture19.407 min
- Lecture19.5
- Lecture19.605 min
- Lecture19.708 min
- Lecture19.808 min
- Lecture19.909 min
- Lecture19.1005 min
- Lecture19.1114 min
- Lecture19.1209 min
- Bonus Section 1
- Lecture20.1
Course Introduction
Hello & welcome to this course, this lecture will give you an overview of the structure of the course, and what you’ll learn in it.
Lab Overview & Needed Software
Next