Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
43 views1 page

Programming Languages: Goals

Uploaded by

Mahdi Last
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views1 page

Programming Languages: Goals

Uploaded by

Mahdi Last
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

(HTML + CSS ) You need them to understand

how the website is designed .

• DOM Manipulation
• XSS ( R , S , Dom )
• Client-Side Validation

Problem Solving
• AJAX and Web APIs
• Event Handling
• JavaScript Security Headers JavaScript Data Structure

Database
• Browser Security Features
• JavaScript Obfuscation Techniques
• Client-Side Storage Programming OOP

• JSON Injection Projects


• Input Validation
• JSON Schema Validation API

• Data Encoding and Escaping


• Client-Side JSON Handlin
• Server-Side JSON Processing JSON Speaking

Writing
• JSON Web Tokens (JWT)
• Secure JSON APIs Programming Languages English
• Security Testing Techniques Reading

• Authentication and Authorization


• Input Validation
Network Concepts && Network Protocols
• Route Protection
Network Topologies && Network Devices
• Database Security
• Error Handling and Logging
IP Addressing and Subnetting && Network Comptia Network+
• Session Management PHP & Laravel
Security
Networks
• File Upload Security Network Troubleshooting && Wireless
• Security Headers and Middleware Networking
• Third-Party Package Security

• Command Line Basics


• Shell Scripting Basics Ways to use tools in a system
• File System Operations
Linux Linux command line
• Text Processing
• System Administration Tasks
Bash script

• System Configuration Analysis


• Log Analysis
Goals Learn how use computer

• Network Monitoring and Analysis How to use the Internet

How to Searching for information in search A+ Certification


engines professionally
• Security Vulnerabilities ) XSS , CSRF , IDOR , Windows Fundamentals
SQLI , authentication bypass, ... ETC ) How to Use Chat GBT to obtain information on
• Concurrency and Race Conditions a specific topic
• Memory Leaks and Memory Corruption

• Buffer Overflows and Underflows


• Logic Errors • Select your goal
• Input Validation and Sanitization • Learn How to Enumeration
Web Application Security • Learn how to recon ) Active & Passive
• Resource Leaks Reconnaissance )
• Performance and Scalability Issues • Learn how to search for site files & folder
• ETC .....
• Record your notes as you work
• Find out what dangerous information is being
leaked and can report it
• Learn how to extract visible and hidden
parameters
Start Doing It
• Learn how to exploit the security vulnerability
• Try to escalate the vulnerability to the
maximum extent possible
• Learn how to understand the severity status of
any vulnerability
• Learn how to write a report correctly

You might also like