All in One Offer! | Access Unlimited Courses in any category starting at just $29. Signup today. Offer Ends in: 3 Days!

Browse Library

Get Unlimited Learning Access
$29
3 days left at this price!
30-Day Money-Back Guarantee

It Includes

  • Get Full Access to the platform
  • Access to 16000+ online courses
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Assignments & Projects
  • Online iLab Access
  • Certificate of Completion
  • Download for offline viewing
  • Free Instructor Support
  • Access valid for 1 user only
  • Cancel Anytime
$29
  • ZAP tool mastery for security testing
  • Penetration testing web applications
  • Uncover hidden bugs and vulnerabilities
  • Use ZAP and burp suite at the same time
  • Invoke hacking applications in ZAP
  • Know the hidden power of ZAP to assess web applications
  • Use ZAP for Bug bounty hunting
  • Use SQLmap, Nmap, Nikto and all tools in kali linux with and in ZAP UI simultaneously

[+] Course at a glance

Welcome, to this course, "PenTesting with OWASP ZAP" a fine grained course that enables you to test web application, automated testing, manual testing, fuzzing web applications, perform bug hunting and complete web assessment using ZAP. focused over ease of use and with special abilities to take down the web applications that most of the tool will leave you with unnoticed and or, un touched critical vulnerabilities in web applications but then the ZAP comes to rescue and do the rest what other tools can not find.

"This course is completely focused over pen testing web applications with ZAP"

The ZAP, is a fine grained tool that every penetration testers, hacker, developers must have in their arsenal and hence required a solid understanding and through training to perform security testing from its core. ZAP can work with and integrate with many tools in the hacking, penetration testing segment such as: SQLmap, nmap, Burp suite, Nikto and every tool inside kali linux. Invoking with burp gives much flexibility to combine the power of ZAP and burp suite at the same time and in complete order.

[+] Some special features of the ZAP

  • Quick start using “point and shoot”

  • Intercepting proxy with liked browser

  • Proxying through zap then scanning

  • Manual testing with automated testing

  • ZAP HUD mode, to test apps and attack in a single page

  • Attack modes for different use cases.

  • Active scanning with passive scanning

  • Requester for Manual testing

  • Plug-n-hack support

  • Can be easily integrated into CI/CD

  • Powerful REST based API

  • Traditional AJAX spider

  • Support for the wide range of scripting languages

  • Smart card support

  • Port scanning

  • Parameter analysis

  • Invoking and using other apps I.e: Burp suite

  • Session management

  • Anti-CSRF token handling

  • Dynamic SSL certificates support

And much more...

[+] Course materials

  • Offline access to read PDF slides

  • 8+ Hours of Videos lessons

  • Self-paced HTML/Flash

  • Access from PC, TABLETS, SMARTPHONES.

  • PDF Slide

[+] Below are the Vulnerabilities that ZAP security tests against a web application & web server to hunt for loopholes

Path Traversal, Remote File Inclusion, Source Code Disclosure - /WEB-INF folder, Server Side Include, Cross Site Scripting (Reflected)

Cross Site Scripting (Persistent) - Prime, Cross Site Scripting (Persistent) - Spider, Cross Site Scripting (Persistent), SQL Injection

Server Side Code Injection, Remote OS Command Injection, Directory Browsing, External Redirect, Buffer Overflow Medium

Format String Error, CRLF Injection Medium, Parameter Tampering, Script Active Scan Rules, Remote Code Execution - Shell Shock

Anti CSRF Tokens Scanner, Heartbleed OpenSSL Vulnerability, Cross-Domain Misconfiguration, Source Code Disclosure - CVE-2012-1823

Remote Code Execution - CVE-2012-1823, Session Fixation, SQL Injection - MySQL, SQL Injection - Hypersonic SQL, SQL Injection - Oracle

SQL Injection - PostgreSQL, Advanced SQL Injection, XPath Injection, XML External Entity Attack, Generic Padding Oracle

Expression Language Injection, Source Code Disclosure - SVN, Backup File Disclosure, Integer Overflow Error, Insecure HTTP Method

HTTP Parameter Pollution scanner, Possible Username Enumeration, Source Code Disclosure - Git, Source Code Disclosure - File Inclusion

Httpoxy - Proxy Header Misuse, LDAP Injection, SQL Injection - SQLite, Cross Site Scripting (DOM Based), SQL Injection - MsSQL

Example Active Scanner: Denial of Service, An example active scan rule which loads data from a file, Cloud Metadata Potentially Exposed

Relative Path Confusion, Apache Range Header DoS, User Agent Fuzzer, HTTP Only Site, Proxy Disclosure, ELMAH Information Leak

Trace.axd Information, .htaccess Information, .env Information Leak, XSLT Injection.

  • Understanding of Web applications
  • Ethical hacker
  • Web application security tester
  • Web Developer
  • Penetration tester
View More...
  • Section 1 : Introduction 1 Lectures 00:23:34

    • Lecture 1 :
    • Introduction to OWASP ZAP Preview
  • Section 2 : Configuration of ZAP 6 Lectures 01:52:30

    • Lecture 1 :
    • Installing ZAP on multi platform
    • Lecture 2 :
    • Six elements of the ZAP - Desktop UI
    • Lecture 3 :
    • ZAP marketplace and add-ons
    • Lecture 4 :
    • Scan policy manager - config
    • Lecture 5 :
    • Configuration of ZAP
    • Lecture 6 :
    • ZAP attack modes
  • Section 3 : Attacking the applications with ZAP 14 Lectures 04:19:48

    • Lecture 1 :
    • Automated attacks within 5 minutes
    • Lecture 2 :
    • Spidering the target
    • Lecture 3 :
    • Fuzzing the target in action
    • Lecture 4 :
    • Active scanning the target
    • Lecture 5 :
    • Break points and Requestor - Repeater
    • Lecture 6 :
    • Authentication and session management
    • Lecture 7 :
    • Forced browsing DIRs and Files using ZAP
    • Lecture 8 :
    • Security testing in HUD mode - Heads-up display
    • Lecture 9 :
    • ZAP Scripting attacks & Recording Zest Script, Python, JavaScript
    • Lecture 10 :
    • Security testing with ZAP API
    • Lecture 11 :
    • Invoking applications into ZAP - SQLmap, Nmap, Nikto
    • Lecture 12 :
    • Invoking Burp suite into ZAP - Best strategy
    • Lecture 13 :
    • Other useful tools add-ons inside zap
    • Lecture 14 :
    • Generating Reports in multiple formats
  • How do i access the course after purchase?

    Once you purchase a course (Single course or Subscription), you will be able to access the courses instantly online by logging into your account. Use the user name & password that you created while signing up. Once logged in, you can go to the "My Courses" section to access your course.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certification after completing the course?

    Yes. Once you succesfully complete any course on Learnfly marketplace, you get a certiifcate of course completion emailed to you within 24 hours with your name & the Learnfly badge. You can definately brag about it & share it on your social media or with friends as one of your achievement. Click here to view the sample certificate Click Here
  • For how long can i access my course after the purchase?

    If you buy a single course, that course is accessible to you for a lifetime. If you go for a premium subcription, you can access all the courses on Learnfly marketplace till your subscription is Active.
  • Whats the difference between Single Course Purchase & Go Premium option?

    With Single Course Purchase, you only get an access of one single course. Whereas, with premium monhtly or annual subscription, you can access all the existing or new courses on learnfly marketplace. You can decide what option suits you the best and accordingly you can make your purchase.
  • Is there any free trial?

    Currently, we don't have any free trial but it may be available in near future.
  • What is the refund policy?

    We would hate you to leave us. However, if you are not satisfied, you can ask for a full refund within 30 days & we will be happy to assist you further.

Atul Tiwari,

Security Analyst | IT AUDITOR | Cyber laws expert | Author | Public speaker | CISSP Having more than 10 years of working experience in the information security field. Have trained more than 60k students on the topic of Information security & penetration testing in classroom mode and online across 168 countries. with expertise in web application penetration testing, i have performed several penetration tests and security audits, security analysis with private, governments and security agencies to help assist with to cope with cyber threats.
View More...
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lecture 80
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lecture 17
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lecture 6
  • cissp-certification-introduction

    CISSP- Certification Introduction

    By : MUKESH SINGH

    Lecture 18
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lecture 40
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lecture 30
Signup & Continue Checkout
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.