Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Hands-On Web App Pentesting

Packt via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. Unlock the world of web application penetration testing with this hands-on course designed to provide practical expertise in identifying and exploiting vulnerabilities in web apps. Learn foundational web basics, including the anatomy of URLs, HTTP methods, and the critical infrastructure behind web applications. Explore databases, APIs, and CMS platforms to develop a robust understanding of how modern web apps function. As you progress, dive deep into the essential tools of the trade, from web browsers to advanced frameworks like Burp Suite, OWASP ZAP, and SQLMap. Gain mastery over a comprehensive toolkit used by industry professionals for reconnaissance and attack planning. Learn to perform manual inspections, vulnerability scans, and directory fuzzing to uncover hidden security flaws. The course culminates in an extensive exploration of attack techniques. From Cross-Site Scripting (XSS) and SQL Injection (SQLi) to CSRF, SSRF, and Command Injection, you’ll gain practical skills to identify, test, and verify various vulnerabilities. Each attack scenario is explained with real-world relevance and practical examples to strengthen your learning. Designed for security enthusiasts, IT professionals, and developers, this course requires a basic understanding of programming and networking. Whether you're a beginner looking to enter the cybersecurity field or an intermediate learner aiming to upskill, this course offers valuable insights at every step.

Syllabus

  • Web Basics
    • In this module, we will explore the fundamental building blocks of web applications, setting the stage for effective pentesting. You'll learn how URLs, HTTP methods, and APIs form the communication backbone of web apps. We'll also dive into the technologies that power web applications, including content management systems, databases, and other infrastructure essentials. By the end of this section, you'll have a solid grasp of web app basics, readying you for more advanced pentesting concepts.
  • Common Tools
    • In this module, we will delve into the arsenal of tools commonly used in web application penetration testing. From user-friendly interfaces like web browsers and Burp Suite to specialized tools like Sublist3r and FFuF, you'll learn how to harness their power for discovering and exploiting vulnerabilities. We'll also explore tools tailored for specific tasks, such as Nikto for server scans, SQLMap for database probing, and WPScan for CMS vulnerabilities. By mastering these tools, you'll be well-equipped to uncover and address security flaws in any web application.
  • Information Gathering and Recon
    • In this module, we will focus on the crucial initial phase of penetration testing: information gathering and reconnaissance. You will learn to conduct manual inspections to understand web application behavior, leverage vulnerability scanning tools to identify security flaws, and utilize directory fuzzing techniques to uncover hidden directories and resources. By mastering these reconnaissance techniques, you will be equipped to map the attack surface and lay a strong foundation for more advanced pentesting activities.
  • Attacks
    • In this module, we will dive deep into the world of web application attacks, exploring a wide range of vulnerabilities and their exploitation. You'll learn how to identify and exploit weaknesses such as Cross-Site Scripting (XSS), SQL Injection (SQLi), and Cross-Site Request Forgery (CSRF). Additionally, we will cover advanced attack techniques like Server-Side Request Forgery (SSRF), JSON Web Token (JWT) attacks, and Insecure Direct Object References (IDOR). By mastering these attacks, you will gain valuable hands-on experience and the skills necessary to assess and mitigate critical security threats in web applications.

Taught by

Packt - Course Instructors

Reviews

Start your review of Hands-On Web App Pentesting

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.