Unlock the world of web application penetration testing with this hands-on course designed to provide practical expertise in identifying and exploiting vulnerabilities in web apps. Learn foundational web basics, including the anatomy of URLs, HTTP methods, and the critical infrastructure behind web applications. Explore databases, APIs, and CMS platforms to develop a robust understanding of how modern web apps function.
![Packt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/fa/3b9b5304c24cf4aa64054631ee946c/360-360-square.png?auto=format%2Ccompress&dpr=1&w=28&h=28)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/1a4589dccee10648821b7ea23e5fca9a.png?auto=format%2Ccompress&dpr=1&q=80)
![Packt](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/http://coursera-university-assets.s3.amazonaws.com/c7/391d0e5f6a4d648dc4f754c5898df7/2.png?auto=format%2Ccompress&dpr=1&h=45)
Hands-On Web App Pentesting
![Packt - Course Instructors](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/2b/9c92f373414941b4a0bbda577bd627/profile.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
Instructor: Packt - Course Instructors
Sponsored by Coursera Learning Team
Recommended experience
What you'll learn
Analyze and exploit vulnerabilities like XSS, SQL Injection, and Command Injection.
Utilize tools like Burp Suite, OWASP ZAP, and SQLMap for pentesting.
Conduct manual inspections and vulnerability scanning to assess security.
Perform directory fuzzing and reconnaissance to map web application structures.
Details to know
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/31ebcba3851b87d1d8609abf15d0ff7e.png?auto=format%2Ccompress&dpr=1&w=24&h=24)
Add to your LinkedIn profile
4 assignments
January 2025
See how employees at top companies are mastering in-demand skills
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/74c8747e8210831049cf88dd4eefe26c.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=320)
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=259)
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/de1a6556fbe605411e8c1c2ca4ba45f1.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=333)
There are 4 modules in this course
In this module, we will explore the fundamental building blocks of web applications, setting the stage for effective pentesting. You'll learn how URLs, HTTP methods, and APIs form the communication backbone of web apps. We'll also dive into the technologies that power web applications, including content management systems, databases, and other infrastructure essentials. By the end of this section, you'll have a solid grasp of web app basics, readying you for more advanced pentesting concepts.
What's included
7 videos1 reading
In this module, we will delve into the arsenal of tools commonly used in web application penetration testing. From user-friendly interfaces like web browsers and Burp Suite to specialized tools like Sublist3r and FFuF, you'll learn how to harness their power for discovering and exploiting vulnerabilities. We'll also explore tools tailored for specific tasks, such as Nikto for server scans, SQLMap for database probing, and WPScan for CMS vulnerabilities. By mastering these tools, you'll be well-equipped to uncover and address security flaws in any web application.
What's included
10 videos1 assignment
In this module, we will focus on the crucial initial phase of penetration testing: information gathering and reconnaissance. You will learn to conduct manual inspections to understand web application behavior, leverage vulnerability scanning tools to identify security flaws, and utilize directory fuzzing techniques to uncover hidden directories and resources. By mastering these reconnaissance techniques, you will be equipped to map the attack surface and lay a strong foundation for more advanced pentesting activities.
What's included
3 videos1 assignment
In this module, we will dive deep into the world of web application attacks, exploring a wide range of vulnerabilities and their exploitation. You'll learn how to identify and exploit weaknesses such as Cross-Site Scripting (XSS), SQL Injection (SQLi), and Cross-Site Request Forgery (CSRF). Additionally, we will cover advanced attack techniques like Server-Side Request Forgery (SSRF), JSON Web Token (JWT) attacks, and Insecure Direct Object References (IDOR). By mastering these attacks, you will gain valuable hands-on experience and the skills necessary to assess and mitigate critical security threats in web applications.
What's included
13 videos2 assignments
Instructor
![Packt - Course Instructors](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera-instructor-photos.s3.amazonaws.com/2b/9c92f373414941b4a0bbda577bd627/profile.jpg?auto=format%2Ccompress&dpr=1&w=75&h=75&fit=crop)
Offered by
Why people choose Coursera for their career
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Felipe_Moitta.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Jennifer_John.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Larry_Tao_Wang_1.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
![](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/growth_testimonials/passionate_learner/Chaitanya_Anand.png?auto=format%2Ccompress&dpr=1&w=64&h=64&fit=crop)
Recommended if you're interested in Information Technology
Coursera Project Network
LearnKartS
![Placeholder](https://d3njjcbhbojbot.cloudfront.net/api/utilities/v1/imageproxy/https://coursera_assets.s3.amazonaws.com/images/7a1c0e2e779c1ff27cae62480adfe003.png?auto=format%2Ccompress&dpr=2&blur=200&px=8&max-w=120)
Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy