Ethical Hacking & IT Security

Course

Online

Save 81%
£ 13 VAT inc.

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Did you know that Jan Koum, founder of Whataspp, Steve Jobs and Bill Gates were all ex-hackers before they became tech entrepreneurs? To protect yourself from hackers, you need to think like one. This course will give you the tools to master ethical hacking. You will gain an understanding of the methodology used in penetration systems.Senior Information Security Consultant, Gabriel Avramescu bring his expertise to help IT professionals get inside the mind of hacker, and understand the vulnerability of IT security.Through a series of video demonstrations, you will see session hijacking via Man-in-The-Middle, get inside Cross-Site Scripting and become familiar with CSRF.

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Understand how to perform penetration testing of a web application Be able to gather information of your target Get to grips with the penetration testing process Gain insight into web application's security principles 

Anyone

None

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Access
  • Hacking
  • Web

Course programme

Why Web Security?
Say hi to your fellow students!
Share your new course with your friends!
Web Technologies
Core Problems - Why Web Security
Preparing The Lab Environment

Mapping The Web Application: user and password brute force
Mapping
Usernames And Passwords Brute-Forcing Using Burp
Spider And Analyze A Website Burp
Brute Forcing Web Resources Using Dirb and Dirbuster

Attacking Authentication And Session Management- session hijacking
Attacking Authentication And Session Management- session hijacking
Session Hijacking Through Man-In-The-Middle Attack
Intercept And Access Traffic HTTPS: get Facebook or Gmail passwords

Access Controls. Data Stores And Client-Side Controls
Access Controls. Data Stores And Client-Side Controls
SQL Injection
Exploiting SQLi Using SQLmap And Getting Remote Shell
Upload And Remote File Execution

Attacking The Server And Application Logic
Attacking The Server

(XSS) Cross Site Scripting. Attacking The Users
Cross Site Scripting. Attacking The Users
Reflected XSS - Session Hijacking Using Cross Site Scripting
Stored Or Persistent Cross Site Scripting
Cross-Site Request Forgery (CSRF)

Guideline For Discovering And Improving Application Security
Overview and Guidelines

Ethical Hacking & IT Security

£ 13 VAT inc.