Skip to content
  • There are no suggestions because the search field is empty.

Recommended Paths (Hands-On Only): Threats

This article describes our Recommended (Hands-On Only) Threat Paths.

Foundational | HackEDU: Credential Reuse

Learn techniques for preventing credential reuse and credential stuffing attacks.

Hands-On Only | Total Learning Path Duration: 1 hour 15 minutes

 

Foundational | HackEDU: Cross-Site Scripting (XSS)

Learn about DOM-Based, Reflected, and Stored Cross-Site Scripting.

Hands-On Only | Total Learning Path Duration: 45 minutes

 

Foundational | HackEDU: Injection Attacks

Learn how to prevent SQL, NoSQL, Command, XXE, and XSS injection attacks.

Hands-On Only | Total Learning Path Duration: 3 hours 15 minutes

 

Foundational | HackEDU: NoSQL Security

Learn about NoSQL injection attacks and how to prevent them.

Hands-On Only | Total Learning Path Duration: 45 minutes

 

Foundational | HackEDU: Publicly Disclosed Vulnerabilities

These lessons are based on vulnerabilities found in real applications from HackerOne's bug bounty program and other publicly disclosed vulnerabilities where you can experiment in a safe and legal environment.

Hands-On Only | Total Learning Path Duration: 2 hours 45 minutes

 

Foundational | HackEDU: Server-Side Request Forgery (SSRF)

Learn about SSRF and then walk through a real world example of the exploit.

Hands-On Only | Total Learning Path Duration: 1 hour

 

Foundational | HackEDU: SQL Security

Learn what an SQLi attack is and how to prevent it.

Hands-On Only | Total Learning Path Duration: 45 minutes