07 Web Application Hacking

Course Description

Since the turn of the millennium, the world has been transitioning from a desktop-centric application environment to web applications and the cloud. Large scale enterprises are choosing web applications over traditional web applications, and modern web application development frameworks and toolkits have made web development ever more accessible to young audiences. This is a great environment for opportunity, however the pace at which web applications are being developed and deployed, combined with the lack of security skills in development teams is a dangerous combination. A large percentage of hacks that take place today are due to vulnerabilities in web applications. This course will teach you the basics of web application hacking. We will learn the most common vulnerabilities and learn how to exploit them to take control of the underlying operating systems, extract data from databases and more.

As always, the first step in learning how to defend is to learn what exactly is attacking you. Our web defence course will be of much value after this course. We start this course from very basic level, covering the general architecture of web applications, and gradually proceed to more advanced topics. Students should have a good grip on Linux, Networking, HTTP and preferably some amount of knowledge of web application development.

Who is this course for?

  • Cybersecurity professionals
  • White hat hackers
  • Penetration testers
  • Web application developers
  • Web App Testers
  • IT professionals 

course stats


  • Basics of web development
    • HTML
    • JavaScript
    • SQL
  • Basic understanding of HTTP
  • Linux 101
  • Networking Concepts
  • Offensive Computing Introduction

Computer with the following requirements

  • At least one of the following operating systems installed(If more than one is installed then no problem):
    • Windows
    • Linux
    • Mac OS X
  • Active broadband internet connection
  • RAM : Min 4GB, Preferred 16GB
  • 50GB Free hard disk Space
  • Suggested Hardware : 2 monitors (one for your exercises, and one to keep this course window open). A single monitor will work fine just as well.

What you will learn

  • Web Application Architecture
  • Weak Points
  • Intercepting Proxies
  • Burp Suite
  • SQLmap
  • Weak Points
  • XSS
  • LFI Attacks
  • Session Hijacking
  • Cookie manipulation
  • Browser exploits
  • OWASP top 10
  • Hacking a live web app

Professional prospects

This course stands as a foundation course for the following professional applications. 

  • Web Application Tester
  • Penetration tester
  • Cybersecurity Auditor
  • Security Engineer
  • Backend Developer – Security
Current Status
Not Enrolled
Get Started
This course is currently closed

This course includes :

Questions before purchasing this course?

No worries, Send us a quick message and we will be happy to answer any questions you have.