(HTML + CSS ) You need them to understand
how the website is designed .
• DOM Manipulation
• XSS ( R , S , Dom )
• Client-Side Validation
Problem Solving
• AJAX and Web APIs
• Event Handling
• JavaScript Security Headers JavaScript Data Structure
Database
• Browser Security Features
• JavaScript Obfuscation Techniques
• Client-Side Storage Programming OOP
• JSON Injection Projects
• Input Validation
• JSON Schema Validation API
• Data Encoding and Escaping
• Client-Side JSON Handlin
• Server-Side JSON Processing JSON Speaking
Writing
• JSON Web Tokens (JWT)
• Secure JSON APIs Programming Languages English
• Security Testing Techniques Reading
• Authentication and Authorization
• Input Validation
Network Concepts && Network Protocols
• Route Protection
Network Topologies && Network Devices
• Database Security
• Error Handling and Logging
IP Addressing and Subnetting && Network Comptia Network+
• Session Management PHP & Laravel
Security
Networks
• File Upload Security Network Troubleshooting && Wireless
• Security Headers and Middleware Networking
• Third-Party Package Security
• Command Line Basics
• Shell Scripting Basics Ways to use tools in a system
• File System Operations
Linux Linux command line
• Text Processing
• System Administration Tasks
Bash script
• System Configuration Analysis
• Log Analysis
Goals Learn how use computer
• Network Monitoring and Analysis How to use the Internet
How to Searching for information in search A+ Certification
engines professionally
• Security Vulnerabilities ) XSS , CSRF , IDOR , Windows Fundamentals
SQLI , authentication bypass, ... ETC ) How to Use Chat GBT to obtain information on
• Concurrency and Race Conditions a specific topic
• Memory Leaks and Memory Corruption
• Buffer Overflows and Underflows
• Logic Errors • Select your goal
• Input Validation and Sanitization • Learn How to Enumeration
Web Application Security • Learn how to recon ) Active & Passive
• Resource Leaks Reconnaissance )
• Performance and Scalability Issues • Learn how to search for site files & folder
• ETC .....
• Record your notes as you work
• Find out what dangerous information is being
leaked and can report it
• Learn how to extract visible and hidden
parameters
Start Doing It
• Learn how to exploit the security vulnerability
• Try to escalate the vulnerability to the
maximum extent possible
• Learn how to understand the severity status of
any vulnerability
• Learn how to write a report correctly