Ethical Hacking & IT Security
Course
Online
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
Did you know that Jan Koum, founder of Whataspp, Steve Jobs and Bill Gates were all ex-hackers before they became tech entrepreneurs? To protect yourself from hackers, you need to think like one. This course will give you the tools to master ethical hacking. You will gain an understanding of the methodology used in penetration systems.Senior Information Security Consultant, Gabriel Avramescu bring his expertise to help IT professionals get inside the mind of hacker, and understand the vulnerability of IT security.Through a series of video demonstrations, you will see session hijacking via Man-in-The-Middle, get inside Cross-Site Scripting and become familiar with CSRF.
Facilities
Location
Start date
Start date
About this course
Understand how to perform penetration testing of a web application Be able to gather information of your target Get to grips with the penetration testing process Gain insight into web application's security principlesÂ
Anyone
None
Reviews
Subjects
- Access
- Hacking
- Web
Course programme
Say hi to your fellow students!
Share your new course with your friends!
Web Technologies
Core Problems - Why Web Security
Preparing The Lab Environment
Mapping The Web Application: user and password brute force
Mapping
Usernames And Passwords Brute-Forcing Using Burp
Spider And Analyze A Website Burp
Brute Forcing Web Resources Using Dirb and Dirbuster
Attacking Authentication And Session Management- session hijacking
Attacking Authentication And Session Management- session hijacking
Session Hijacking Through Man-In-The-Middle Attack
Intercept And Access Traffic HTTPS: get Facebook or Gmail passwords
Access Controls. Data Stores And Client-Side Controls
Access Controls. Data Stores And Client-Side Controls
SQL Injection
Exploiting SQLi Using SQLmap And Getting Remote Shell
Upload And Remote File Execution
Attacking The Server And Application Logic
Attacking The Server
(XSS) Cross Site Scripting. Attacking The Users
Cross Site Scripting. Attacking The Users
Reflected XSS - Session Hijacking Using Cross Site Scripting
Stored Or Persistent Cross Site Scripting
Cross-Site Request Forgery (CSRF)
Guideline For Discovering And Improving Application Security
Overview and Guidelines
Ethical Hacking & IT Security