IT: Ethical Hacking & IT Security
OfCourse
Summary
- Certificate of completion - Free
- Tutor is available to students
Add to basket or enquire
Overview
*New Year Sale: Our lowest ever price, this month only* Did you know that Jan Koum, founder of Whataspp, Steve Jobs and Bill Gates were all ex-hackers before they became tech entrepreneurs? To protect yourself from hackers, you need to think like one. This course will give you the tools to master ethical hacking. You will gain an understanding of the methodology used in penetration systems.
Course media
Description
Course Highlights
- Understand how to perform penetration testing of a web application
- Be able to gather information of your target
- Get to grips with the penetration testing process
- Gain insight into web application’s security principles
Course Overview
Through a series of video demonstrations, you will see session hijacking via Man-in-The-Middle, get inside Cross-Site Scripting and become familiar with CSRF.
Instructor Bio
Senior Information Security Consultant, Gabriel Avramescu bring his expertise to help IT professionals get inside the mind of hacker, and understand the vulnerability of IT security.
Course Curriculum
Why Web Security?
- Web Technologies
- Core Problems - Why Web Security
- Preparing The Lab Environment
Mapping The Web Application: user and password brute force
- Mapping
- Usernames And Passwords Brute-Forcing Using Burp
- Spider And Analyze A Website Burp
- Brute Forcing Web Resources Using Dirb and Dirbuster
Attacking Authentication And Session Management- session hijacking
- Attacking Authentication And Session Management- session hijacking
- Session Hijacking Through Man-In-The-Middle Attack
- Intercept And Access Traffic HTTPS: get Facebook or Gmail passwords
Access Controls. Data Stores And Client-Side Controls
- Access Controls. Data Stores And Client-Side Controls
- SQL Injection
- Exploiting SQLi Using SQLmap And Getting Remote Shell
- Upload And Remote File Execution
Attacking The Server And Application Logic
- Attacking The Server
(XSS) Cross Site Scripting. Attacking The Users
- Cross Site Scripting. Attacking The Users
- Reflected XSS - Session Hijacking Using Cross Site Scripting
- Stored Or Persistent Cross Site Scripting
- Cross-Site Request Forgery (CSRF)
Guideline For Discovering And Improving Application Security
- Overview and Guidelines
Why Choose OfCourse Learning?
- All courses are taught by verified experts
- Students enjoy 24/7 access to their courses
- Courses can be accessed on any device
- Students get lifetime access to their courses so they can work at their own pace
- On completion, students receive a course certificate from a recognised educational institution
- Become a part of a global learning community where you can talk with teachers and students about the course
Who is this course for?
- Web developers
- Anyone who wants to learn the ethical hacking and web penetration pricess
- IT students or passionate hobbyists
Requirements
Basic computing and IT skills. You will need basic knowledge of Linux and/or Windows
Certificates
Certificate of completion
Digital certificate - Included
Reviews
Legal information
This course is advertised on reed.co.uk by the Course Provider, whose terms and conditions apply. Purchases are made directly from the Course Provider, and as such, content and materials are supplied by the Course Provider directly. Reed is acting as agent and not reseller in relation to this course. Reed's only responsibility is to facilitate your payment for the course. It is your responsibility to review and agree to the Course Provider's terms and conditions and satisfy yourself as to the suitability of the course you intend to purchase. Reed will not have any responsibility for the content of the course and/or associated materials.