Join 140,000+ students in learning cyber security, pentesting and ethical hacking! Learn everything you need today!
Website hacking
Penetration testing
How to find vulnerabilities
How to secure vulnerabilities
How to exploit vulnerabilities
Computer security fundamentals
How to secure and exploit the OWASP Top 10
Cyber security
Ethical Hacking
How to identify bug bounties
Black hat hacker/red team techniques
SQL injection
Cross site scripting (XSS)
Web application security
Computer security is one of the biggest job gaps in history, with a shortage of 3.5 million skilled workers needing to tackle a problem estimated to be worth $6 trillion. This is one of the biggest opportunities in history.
When I was at university I did a lot of security courses and to be honest I was pretty frustrated at how they were taught. The concepts and their importance captured my imagination but I knew it could be taught in a better way… so I created a few YouTube videos on the topic. They were very well received… So well received that after a few years working in industry I decided to make this course.
Although this course covers practical methods for breaking into and securing systems, most of the lectures focus on principals which allow you to properly understand the concepts. This differs from a lot of courses on Udemy that teach specific tools that will be out of date next year. This course is designed to teach the next thought leaders of the industry… ones who are capable of making tools that make everything before it seem outdated.
This course covers all the topics of several of my courses at university. It’s not long, it’s light hearted, and doesn’t feel dense… but all the content is there.
English
Language
Injection
Be Ethical. Never Hack.
Never Hack
Injection Intro
SQL Injection
XML Injection
Library Bloat
Cross Site Scripting (XSS)
Injection Defense
Do I need to worry about injection here?
Core Knowledge
Common Terms
Phishing
Ethics & Legality
Basics
Attack Surface
0 days
Brute Force
Misconceptions
Core Knowledge Quiz
Security Mindset
Security Mindset
Client Side and Server Side
Client and Server Side
Client and Server Side Quiz
Authentication and Access Control
Authentication and Access Control
Authentication and Access Control Quiz
Cryptography
What is a Cryptographic Hash?
How is Hashing Useful?
Hash Attacks
Cryptographic Hash Defense
Encryption
Cryptography Quiz
Cross Site Request Forgery
Cross Site Request Forgery
CSRF Quiz
Deployment
DDoS – Distributed Denial of Service
Configuration
Passwords
Deployment Quiz
External Packages
External Packages
Implement or Import?
External Packages Quiz
Monitoring and Response
Shocking Figures
Identifying an Attack
Honeypots
Breach Response and Defense
Monitoring and Response Quiz
Conclusion
OWASP Top 10
Conclusion
The post Ethical Hacking: Pentesting and Securing Web Applications appeared first on StudyBullet.