Home Search Profile

Master Burp Suite: OWASP Top 10 Security Pro Course

Focused View

1:10:25

  • 1. Course Overview.mp4
    01:41
  • 1. Getting Started.mp4
    04:04
  • 2. Active and Passive Scanning.mp4
    02:19
  • 3. Directory Traversal.mp4
    02:20
  • 4. Cryptographic Failures.mp4
    03:23
  • 1. Broken Access Controls.mp4
    04:52
  • 2. Identity and Authentication Failures.mp4
    04:56
  • 3. Brute Force Authentication.mp4
    02:53
  • 4. Insecure Direct Object Reference.mp4
    04:04
  • 5. Privilege Escalation.mp4
    04:29
  • 6. Account Enumeration.mp4
    03:20
  • 1. Injection.mp4
    03:23
  • 2. SQL Injection.mp4
    03:43
  • 3. XSS.mp4
    08:41
  • 4. Parameter Tampering.mp4
    03:09
  • 1. Mishandling Cookie and Session Tokens.mp4
    07:45
  • 2. Session and Cookie Sequencer.mp4
    03:25
  • 3. Course Summary.mp4
    01:58
  • More details


    Course Overview

    Uncover critical web vulnerabilities using Burp Suite in this hands-on course. Learn to identify and exploit OWASP Top 10 security risks through practical techniques and real-world scenarios.

    What You'll Learn

    • Detect injection vulnerabilities like SQLi and XSS
    • Exploit broken authentication and session management flaws
    • Identify access control and cryptographic failures

    Who This Is For

    • Penetration testers and security analysts
    • Web developers seeking security expertise
    • IT professionals transitioning to cybersecurity

    Key Benefits

    • Hands-on Burp Suite training with real-world techniques
    • Comprehensive coverage of OWASP Top 10 vulnerabilities
    • Actionable skills for immediate application

    Curriculum Highlights

    1. Automated testing and misconfiguration scanning
    2. Access control and authentication vulnerabilities
    3. Input validation and session management flaws
    Focused display
    • language english
    • Training sessions 18
    • duration 1:10:25
    • level average
    • English subtitles has
    • Release Date 2025/06/02

    Courses related to Ethical Hacking

    Courses related to Penetration Testing