- Lecture1.1 01-Introduction
- Lecture1.2 02-Broken Authentication & Access Control
- Lecture1.3 03-Insecure direct object references (IDOR) (Labs)
- Lecture1.4 04-Cross-Site Request Forgery (CSRF) (Explain)
- Lecture1.5 05-Cross-Site Request Forgery (CSRF) (Labs)
- Lecture1.6 06-Two Factor Authentication Bypass
- Lecture1.7 07-SQL injection (Explain & Labs)
- Lecture1.8 08-SQL injection scripting
- Lecture1.9 09-Cross site scripting (XSS)
- Lecture1.10 10-Cross site scripting (XSS) Labs
- Lecture1.11 11-Server Side Template Injection (SSTI) (Explain & Labs)
- Lecture1.12 12-Open redirect (Explain)
- Lecture1.13 13-Open redirect (Labs)
- Lecture1.14 14-XML external entity (XXE) (Explain & Labs)
- Lecture1.15 15-OAuth Misconfiguration (Explain and Labs)
- Lecture1.16 16-Cross-origin resource sharing (CORS) (Explain)
- Lecture1.17 17-Cross-origin resource sharing (CORS) (Labs)
- Lecture1.18 18-Clickjacking
- Lecture1.19 19-CORS & Clickjacking (Labs)
- Lecture1.20 20-JSON with Padding (JSONP) (Explain)
- Lecture1.21 21-JSON with Padding (JSONP) (Labs)
- Lecture1.22 22-PostMessage Attacks
- Lecture1.23 23-LFI & Path Traversal
- Lecture1.24 24-LFI & Path Traversal (More Labs)
- Lecture1.25 25-Host header attacks (Explain)

