Pentesting with Daniel Slater (Ethical Hacking/Web Security)
Pentesting with Daniel Slater (Ethical Hacking/Web Security), available at $49.99, has an average rating of 3.65, with 35 lectures, 10 quizzes, based on 1729 reviews, and has 173087 subscribers.
You will learn about Website hacking Penetration testing How to find vulnerabilities How to secure vulnerabilities How to exploit vulnerabilities Computer security fundamentals How to secure and exploit the OWASP Top 10 Cyber security Ethical Hacking How to identify bug bounties Black hat hacker/red team techniques SQL injection Cross site scripting (XSS) Web application security This course is ideal for individuals who are University students studying computer science or a related field or Tinkerers wanting to ensure their apps are secure or Employees wanting to improve the cyber security of their firm or Developers interested in learning security or Security professionals wanting to refresh their knowledge It is particularly useful for University students studying computer science or a related field or Tinkerers wanting to ensure their apps are secure or Employees wanting to improve the cyber security of their firm or Developers interested in learning security or Security professionals wanting to refresh their knowledge.
Enroll now: Pentesting with Daniel Slater (Ethical Hacking/Web Security)
Summary
Title: Pentesting with Daniel Slater (Ethical Hacking/Web Security)
Price: $49.99
Average Rating: 3.65
Number of Lectures: 35
Number of Quizzes: 10
Number of Published Lectures: 35
Number of Published Quizzes: 10
Number of Curriculum Items: 47
Number of Published Curriculum Objects: 47
Original Price: $199.99
Quality Status: approved
Status: Live
What You Will Learn
- Website hacking
- Penetration testing
- How to find vulnerabilities
- How to secure vulnerabilities
- How to exploit vulnerabilities
- Computer security fundamentals
- How to secure and exploit the OWASP Top 10
- Cyber security
- Ethical Hacking
- How to identify bug bounties
- Black hat hacker/red team techniques
- SQL injection
- Cross site scripting (XSS)
- Web application security
Who Should Attend
- University students studying computer science or a related field
- Tinkerers wanting to ensure their apps are secure
- Employees wanting to improve the cyber security of their firm
- Developers interested in learning security
- Security professionals wanting to refresh their knowledge
Target Audiences
- University students studying computer science or a related field
- Tinkerers wanting to ensure their apps are secure
- Employees wanting to improve the cyber security of their firm
- Developers interested in learning security
- Security professionals wanting to refresh their knowledge
Computer security is one of the biggest job gaps in history, with a shortage of 3.5 million skilled workers needing to tackle a problem estimated to be worth $6 trillion. This is one of the biggest opportunities in history.
When you complete this course you’ll have the knowledge to get a job and cash in on the $6 trillion industry!
Although this course covers practical methods for breaking into and securing systems, most of the lectures focus on principals which allow you to properly understand the concepts. This differs from a lot of courses on Udemy that teach specific tools that will be out of date next year. This course is designed to teach the next thought leaders of the industry… ones who are capable of making tools that make everything before it seem outdated!
This course covers all the topics of several of my courses at university. It’s not long, it’s light hearted, and doesn’t feel dense… but all the content is there.
This course includes lectures on:
-
Core Security Principals
-
Injection
-
SQL Injection
-
XML Injection
-
JSON Injection
-
Cross Site Scripting (XSS)
-
-
Phishing
-
Brute Force
-
Security Mindset
-
Client Side and Server Side Attacks
-
Authentication and Access Control
-
Cryptography
-
Encryption
-
Hashing
-
-
Cross Site Request Forgery (CSRF)
-
DDoS
-
Password
-
Deployment Best Practices
-
External Packages
-
Monitoring and Response
-
Honeypots
-
OWASP Top 10
And two assignments that will test your patience and show you what real hacking is like!
Course Curriculum
Chapter 1: Injection
Lecture 1: Be Ethical. Never Hack.
Lecture 2: Injection Intro
Lecture 3: SQL Injection
Lecture 4: XML Injection
Lecture 5: Library Bloat
Lecture 6: Cross Site Scripting (XSS)
Lecture 7: Injection Defense
Chapter 2: Core Knowledge
Lecture 1: Common Terms
Lecture 2: Phishing
Lecture 3: Ethics & Legality
Lecture 4: Basics
Lecture 5: Attack Surface
Lecture 6: 0 days
Lecture 7: Brute Force
Lecture 8: Misconceptions
Chapter 3: Security Mindset
Lecture 1: Security Mindset
Chapter 4: Client Side and Server Side
Lecture 1: Client and Server Side
Chapter 5: Authentication and Access Control
Lecture 1: Authentication and Access Control
Chapter 6: Cryptography
Lecture 1: What is a Cryptographic Hash?
Lecture 2: How is Hashing Useful?
Lecture 3: Hash Attacks
Lecture 4: Cryptographic Hash Defense
Lecture 5: Encryption
Chapter 7: Cross Site Request Forgery
Lecture 1: Cross Site Request Forgery
Chapter 8: Deployment
Lecture 1: DDoS – Distributed Denial of Service
Lecture 2: Configuration
Lecture 3: Passwords
Chapter 9: External Packages
Lecture 1: External Packages
Lecture 2: Implement or Import?
Chapter 10: Monitoring and Response
Lecture 1: Shocking Figures
Lecture 2: Identifying an Attack
Lecture 3: Honeypots
Lecture 4: Breach Response and Defense
Chapter 11: Conclusion
Lecture 1: OWASP Top 10
Lecture 2: Conclusion
Instructors
-
Daniel Slater
Over 170,000 students – Computer Security Expert – Engineer
Rating Distribution
- 1 stars: 71 votes
- 2 stars: 83 votes
- 3 stars: 306 votes
- 4 stars: 512 votes
- 5 stars: 757 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Language Learning Courses to Learn in November 2024
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024