Skip to content
6005-CEM Security
XSS Videos
Initializing search
6005-CEM Security
Home
Essentials
Essentials
Module Guide
Assessment
Assessment
Overview
Coursework 1
Coursework 2
Teaching and Learning
MS Teams
Guides
Guides
Overview
Using These Materials
Home Lab Setup
Kali in the University
Docker Guide
Github Labs
Further Hacking
Week 1 Introduction
Week 1 Introduction
Materials
Materials
Introduction
What Is Cyber Security?
3 Pillars of Cyber Security
CIA Triangle
Threats to Businesses
Types of Attack
Who are the Hackers
Lab Tasks
Lab Tasks
Lab Tasks
Video Walkthrough
Videos
Videos
Video "Lectures"
Week 2 Legal Factors
Week 2 Legal Factors
Materials
Materials
Introduction
GDPR
Privacy by design
Implementing GDPR
Online Lecture
Online Lecture
Lecture
Task
Lab
Lab
Lab Session
Week 3 Secure Design and Infrastructure
Week 3 Secure Design and Infrastructure
Materials
Materials
Introduction
Threats To Systems
Technology
Secure Design Principles
Secure Development Lifecycle
Online Lectures
Online Lectures
Lecture
Labs
Labs
Port Scanner
Week 4 Cryptography (Hashing)
Week 4 Cryptography (Hashing)
Materials
Materials
Introduction
Authentication
History of Crypto
Encoding
Hashing
Online Lectures
Online Lectures
Lecture
Lab Session
Lab Session
Using Hashes
Week 5 Cryptography (Encryption)
Week 5 Cryptography (Encryption)
Materials
Materials
Introduction
Symmetric Encryption
Key Exchange
Asymetric Encryption
On Campus Lab Session
On Campus Lab Session
Chat Client
Week 6 Common Vulnerblitlites and Audit
Week 6 Common Vulnerblitlites and Audit
Materials
Materials
Introduction
OWASP top 10
Classifying Vulns
Audit: Methods
Audit: Eyeballing
Audit: Automation
Week 7 HTTP, Requests and Sessions
Week 7 HTTP, Requests and Sessions
Introduction
The HTTP Protocol and Requests
The HTTP Protocol and Requests
The HTTP Protocol
Requests and Responses
Sending User Data to the Server
Making Requests
Authentication and Sessions
Authentication and Sessions
Authentication and Authorisation
Authentication in the Web
Storing Data on the Client
Sessions
Lab Tasks
Lab Tasks
Requests Tasks
Sessions Tasks
Week 8 SQL Injection
Week 8 SQL Injection
Introduction
Videos
Materials
Materials
SQL And Injection
SQL Injection
Database Enumeration
Blind SQL Injecton
Lab Tasks
Lab Tasks
Lab Task
Week 9 Shells and XSS
Week 9 Shells and XSS
Introduction
Videos
Videos
Table of contents
Reflected XSS
Stored XSS
XSS in Attributes
Session Jacking
Intro to Filter Trainer
Materials
Materials
XSS
XSS Types
XSS Payloads
Lab Session
Lab Session
Lab Task
Week 10 Overflows
Week 10 Overflows
Introduction
Materials
Materials
Overflows and Memory Allocation
Overflowing a Buffer
Worked Example of a Function Call
My First Overflow
Fun and Profit
Ret2Reg
Lab Session
Lab Session
Lab Session
Table of contents
Reflected XSS
Stored XSS
XSS in Attributes
Session Jacking
Intro to Filter Trainer
Videos
Reflected XSS
Stored XSS
XSS in Attributes
Session Jacking
Intro to Filter Trainer
Back to top