Complete Ethical Hacking & Penetration Testing for Web Apps
Complete Ethical Hacking & Penetration Testing for Web Apps, available at $54.99, has an average rating of 3.73, with 31 lectures, based on 269 reviews, and has 5657 subscribers.
You will learn about You will understand about how to make use of the most popular vulnerabilities (OWASP TOP 10) to hack into a website and the ways to prevent it. This course is ideal for individuals who are Beginners, curious about penetration testing, who have an overview of how web applications work, good to have basic HTML, Java-script and PHP knowledge. Developers and testers who want to upgrade themselves as penetration testers. It is particularly useful for Beginners, curious about penetration testing, who have an overview of how web applications work, good to have basic HTML, Java-script and PHP knowledge. Developers and testers who want to upgrade themselves as penetration testers.
Enroll now: Complete Ethical Hacking & Penetration Testing for Web Apps
Summary
Title: Complete Ethical Hacking & Penetration Testing for Web Apps
Price: $54.99
Average Rating: 3.73
Number of Lectures: 31
Number of Published Lectures: 31
Number of Curriculum Items: 31
Number of Published Curriculum Objects: 31
Original Price: $139.99
Quality Status: approved
Status: Live
What You Will Learn
- You will understand about how to make use of the most popular vulnerabilities (OWASP TOP 10) to hack into a website and the ways to prevent it.
Who Should Attend
- Beginners, curious about penetration testing, who have an overview of how web applications work, good to have basic HTML, Java-script and PHP knowledge. Developers and testers who want to upgrade themselves as penetration testers.
Target Audiences
- Beginners, curious about penetration testing, who have an overview of how web applications work, good to have basic HTML, Java-script and PHP knowledge. Developers and testers who want to upgrade themselves as penetration testers.
DISCLAIMER:
—————–
ANY ACTIONS AND OR ACTIVITIES RELATED TO THE MATERIAL CONTAINED WITHIN THIS COURSE IS SOLELY YOUR RESPONSIBILITY. THE MISUSE OF THE INFORMATION IN THIS CAN RESULT IN CRIMINAL CHARGES BROUGHT AGAINST THE PERSONS IN QUESTION. THE INSTRUCTOR OR THE PLATFORM WILL NOT BE HELD RESPONSIBLE IN THE EVENT ANY CRIMINAL CHARGES BE BROUGHT AGAINST ANY INDIVIDUALS MISUSING THE INFORMATION IN THIS COURSE TO BREAK THE LAW.
Hello and welcome to Web Based Ethical Hacking and Penetration Testing for Beginners. This course is an introduction to your career as a web security expert.
Internet is all around us. We have been using the facilities of internet since a long while and as the internet came in, the cyber-security threat also started to appear. You can hear stories of cyber-attacks day by day in news papers and media.
As the facilities, the easiness and the comfort of using internet based applications, even if its a web application or a mobile application which is using a cloud based API, the chances of getting a cyber attack has also been increased. It has been increased to such a level that we cannot even predict what happens the next day, because hackers are always alert and vigilant and they are looking for a loophole to get into an application and steal your information.
Like the saying ” A person knows how to break a lock, can make a good lock !” , because he knows the vulnerabilities, he knows the loop holes and that person can build a good secure application or he can guide the developer to build a good application which is almost secure and which does not have the loop holes that has already been discovered.
So being cyber security professionals or being cyber security enthusiasts , we will deal with the OWASP Top 10 vulnerabilities . OWASP is a community based project, that is Open Web Application Security Project. Periodically they will be updating their list of vulnerabilities. And in this Top 10 list of vulnerabilities we will be having a subset of other vulnerabilities which will be coming under this top 10 vulnerabilities. So we will cover almost 30 kind of most popular vulnerabilities in this course and these vulnerabilities are the common vulnerabilities that is currently in the Cyber World.
Once you get hold of these 30 vulnerabilities, you will be having enough confidence to test a web application or test a cloud based application in an API based application, a mobile application which is using a cloud based API. In every session I am giving you the mitigations, the defensive mechanisms that we can follow to avoid the vulnerability that we discussed in that particular session. So you will be able to suggest the defensive measures to the programmer or to the developer who is developing the web application.
Please make sure you are using these techniques only for Penetration Testing as well as Ethical Hacking and please do not use it for any other illegal purpose or any other un-ethical kind of things.
Cyber-security and Penetration Testing is a very lucrative career. This course is indented for Cyber Security Beginners, with an overview of basic web coding, interested to come into the cyber security world,and also, existing Testers, who are willing to go into the Penetration Testing. People who are interested in Ethical Hacking can also do this course.
In this course, we will be concentrating mainly on how Penetration Testing can be done on web based applications. And it can also be used for mobile based applications because most of the mobile based applications communicate with a cloud based API. The security of this API is actually the security of the mobile application which is using this API. And by the end of this course, we will be providing you with a course completion certificate on-demand, which you can include in your resume and it will be giving very high value to your current profile.
I promise that you are going to have a really thrilling experience doing Penetration Testing and Ethical Hacking. So see you soon in the class room.
Course Curriculum
Chapter 1: Quick Overview of the Course
Lecture 1: Quick Overview of the Course
Chapter 2: Lab Setup 1 : Install WAMP
Lecture 1: Install WAMP, the Apache, PHP and MySQL stack for hosting the demo web server
Chapter 3: Lab Setup 2: Install Mutillidae
Lecture 1: Install Mutillidae II, a free, open source, deliberately vulnerable web-app
Lecture 2: Latest Download link For Mutillidae
Chapter 4: Lab Setup 3: Install Burp Suite
Lecture 1: Install Burp Suite – An integrated platform for security testing of web Sites
Chapter 5: Troubleshooting Burp : Cannot load HTTPS Websites
Lecture 1: Troubleshooting Burp : Cannot load or Intercept HTTPS Websites
Chapter 6: SQL Injection – Attack and Defenses
Lecture 1: SQL Injection – Hacking Techniques and Defenses
Chapter 7: OS Command Injection – Attack and Defenses
Lecture 1: OS Command Injection – Hacking Techniques and Defenses
Chapter 8: JSON Injection Attack using Reflected XSS Technique and Defense Measures
Lecture 1: JSON Injection Attack using Reflected XSS Technique and Defense Measures
Chapter 9: Cookie Manipulation Attack and Defenses
Lecture 1: Cookie Manipulation Attack and Defense Tips
Chapter 10: Username Enumeration Attack – Part 1& 2
Lecture 1: Username Enumeration Attack – Part 1
Lecture 2: Username Enumeration Attack and Defense Tips – Part 2
Chapter 11: Brute Force Attack Technique and Defenses
Lecture 1: Brute Force Attack Technique and Defenses
Chapter 12: Cross Site Scripting (Reflected XXS using HTML Context)
Lecture 1: Cross Site Scripting (Reflected XXS using HTML Context)
Chapter 13: Cross Site Scripting (Reflected XSS using JavaScript)
Lecture 1: Cross Site Scripting (Reflected XSS using JavaScript)
Chapter 14: Storage Cross Site Scripting Attack – XSS Defenses
Lecture 1: Storage Cross Site Scripting Attack – XSS Defenses
Chapter 15: Insecure Direct Object Reference – IDOR and Defense using File Tokens
Lecture 1: Insecure Direct Object Reference – IDOR and Defense using File Tokens
Chapter 16: Insecure Direct Object Reference – IDOR and Defense using URL Tokens
Lecture 1: Insecure Direct Object Reference – IDOR and Defense using URL Tokens
Chapter 17: Directory Browsing / Traversal Threat Demonstration
Lecture 1: Directory Browsing / Traversal Threat Demonstration
Chapter 18: XXE – XML External Entity Attack
Lecture 1: XXE – XML External Entity Attack Demonstration
Chapter 19: User Agent Manipulation or Spoofing Attack
Lecture 1: User Agent Manipulation or Spoofing Attack
Chapter 20: Security miss-configuration Attack Defenses (DIR Browsing, XXE, User Agent)
Lecture 1: Security miss-configuration Attack Defenses (DIR Browsing, XXE, User Agent)
Chapter 21: Sensitive Data Exposure Vulnerability (HTML/CSS/JS Comments)
Lecture 1: Sensitive Data Exposure Vulnerability (via HTML/CSS/JS Comments)
Chapter 22: Hidden / Secret URL Vulnerability and Defenses
Lecture 1: Hidden / Secret URL Vulnerability and Defenses
Chapter 23: HTML 5 Web Storage Vulnerability and Defenses
Lecture 1: HTML 5 Web Storage Vulnerability and Defenses
Chapter 24: Role Based Access Vulnerability and Defense
Lecture 1: Role Based Access Vulnerability and Defense
Chapter 25: CSRF – Cross Site Request Forgery Attack
Lecture 1: CSRF – Cross Site Request Forgery Attack – Part 1
Lecture 2: CSRF – Cross Site Request Forgery Attack & Defenses – Part 2
Chapter 26: Entropy Analysis for CSRF Token
Lecture 1: Entropy Analysis for CSRF Token
Chapter 27: CVSS – Common Vulnerability Scoring System
Lecture 1: CVSS – Common Vulnerability Scoring System
Chapter 28: Unvalidated URL Redirect Attack and Prevention code sample
Lecture 1: Unvalidated URL Redirect Attack and Prevention code sample
Instructors
-
Abhilash Nelson
Computer Engineering Master & Senior Programmer at Dubai
Rating Distribution
- 1 stars: 12 votes
- 2 stars: 13 votes
- 3 stars: 50 votes
- 4 stars: 94 votes
- 5 stars: 100 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024