1. Course Introduction
2. Introduction to Web Proxies
3. Introduction to Burp Suite
4. Configuring the Burp Proxy
5. Burp Suite Dashboard & UI
6. Burp Suite Target & Scope
7. Passive Crawling with Burp Suite
8. Burp Suite Intruder
9. Attacking Basic Auth with Intruder & Decoder
10. Burp Suite Repeater
11. Introduction to OWASP ZAP
12. OWASP ZAP Dashboard & UI
13. Configuring the OWASP ZAP Proxy
14. OWASP ZAP Context & Scope
15. Directory Enumeration with OWASP ZAP
16. Web App Scanning with OWASP ZAP
17. Spidering with OWASP ZAP
18. Attacking HTTP Login Forms with OWASP ZAP
19. Course Conclusion