Ethical Hacking Practical Course
Gain competencies in WebApplication Penetration Testing , Ethical Hacking , Website Hacking with the support of a tutor
Debayan Dey
Summary
- Reed courses certificate of completion - Free
- Tutor is available to students
Add to basket or enquire
Overview
Welcome to the Ethical Hacking Practical Course
Now this Ethical Hacking Practical Course is designed for anyone who is interested in learning how an attacker attack and get the information from website by exploiting various vulnerabilities available.
This course is designed by keeping in mind that most of us are having laptops or computer machine to work for most of the time and in a survey , we came up with the answer that most of the Computer users are very much interested in Learning how Web Application Penetration Testing works and what are the process in which we use penetration testing and security skills to find different vulnerabilities in web applications. As we all know , website and webservers plays an important role in every modern organization.
That's why in this course curriculum. For the Ethical Hacking Practical Course you only need a computer device and this entire course is 100% practical based !
Isn't this amazing ???
And everything will be explained in depth , followed with reading materials and quizzes which will give you a boost in the field of Ethical Hacking!!! so all in one , you just require a computer device and turn it into powerful ethical hacking machine.
Certificates
Reed courses certificate of completion
Digital certificate - Included
Will be downloadable when all lectures have been completed
Curriculum
Course media
Description
in 1st section of Ethical Hacking Practical Course,
-
Meet and Greet !!!
-
Downloading and installation of virtual box
-
Understanding of what is Virtual Machine
-
Download of Kali Linux Virtual Box image
-
Installation of Kali linux 2020
-
Booting up kali in virtual box for the 1st time
-
Default login and update and upgrade
-
Full Screen and understanding FSH i.e. File System Hierarchy
-
and much more with Reading Materials and Quizzes ..!!
in 2nd section ,
-
Basic linux command who am i
-
Basic Commands su and pwd
-
Basic command ls touch nano
-
Basic command cat cp mkdir
-
Basic Command mv and rm
-
System and User Commands
-
Network commands
-
Add New User with full sudo Permission
-
How to delete user using command line
-
and much more with Reading Materials and Quizzes ..!!
next section , i.e. our 3rd Section will cover DVWA.
-
What is DVWA
-
XAMPP Theory and Installation
-
DVWA download Install and configuration with XAMPP
-
Command Injection Low , Medium and High Security
-
File Inclusion Low , Medium and High Security
-
File Upload Low , Medium and High Security
-
XSS DOM Low , Medium and High Security
-
XSS Reflected Low , Medium and High Security
-
XSS Stored Low , Medium and High Security
-
and much more with Reading Materials and Quizzes ..!!
Coming to our 4th section , we will work with OWASP MUTILLIDAE.
-
Download and install Mutillidae II
-
Root access denied fixed
-
SQL Injection
-
SQL Injection Reexplained
-
SQL injection with SQL MAP
-
How to solve show hints in security level 5 challenge
-
How to scan a webserver using NIKTO
-
XSS in Mutilidae Theory and Practical
-
DOM based XSS Explanation
-
Reflected XSS
-
Stored XSS
-
BEEF Framework
-
and much more with Reading Materials and Quizzes ..!!
Coming to our next section , i.e. 5th Section , we have OWASP JUICE shop.
-
What is OWASP Juice shop and installation of nodejs and npm
-
OWASP juice shop up in running
-
Finding the Score Board Level 1 Difficulty Challenge
-
Zero Star Feedback Level 1 Difficulty Challenge
-
Access Confidential Document Level 1 Difficulty Challenge
-
DOM based XSS Level 1 Difficulty Challenge
-
Error Handling Level 1 Difficulty Challenge
-
Missing Encoding Level 1 Difficulty Challenge
-
Bonus Payload DOM XSS Level 1 Difficulty Challenge
-
Exposed Metrics Level 1 Challenge
-
Outdated WhiteList Level 1 Challenge
-
Privacy Policy Level 1 Difficulty Challenge
-
Repetitive Registration Level 1 Difficulty Challenge
Who is this course for?
Anybody interested in learning website & web application hacking / penetration testing
Anyone who is curious about how data is leaked from social media environments
Anybody interested website hacking
Anyone who is afraid of being hacked and would like to secure his/her websites
Anybody interested in learning how to secure websites & web applications from hacker
Web admins so they can secure their websites
Web developers so they can create secure web application & secure their existing ones
Requirements
4 GB (Gigabytes) of RAM or higher (8 GB recommended)
Minimum 20 GB or more disk space
No Linux, programming or hacking knowledge required
Operating System: Windows / OS X / Linux
Enable virtualization technology on BIOS settings, such as “Intel-VTx”
All items referenced in this course are Free
A strong desire to understand hacker tools and techniques
Career path
- Information Security Analyst.
- Security Analyst.
- Certified Ethical Hacker (CEH)
- Ethical Hacker.
- Security Consultant, (Computing / Networking / Information Technology)
- Information Security Manager.
- Penetration Tester.
Questions and answers
Currently there are no Q&As for this course. Be the first to ask a question.
Reviews
Currently there are no reviews for this course. Be the first to leave a review.
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.