This course contains everything to start working as a web pentester. You will learn about exploitation techniques, hacking tools, methodologies, and the whole process of security assessments. It is absolutely hands-on, you will do all the attacks in your own penetration testing environment using the provided applications. The targets are real open-source software. You will have to work hard but at the end you will be able to do web security assessments on your own as a real ethical hacker. My name is Geri and I am the instructor of this course about web application hacking. If you are interested in hacking and IT security, then this is the perfect place to start. You might be a developer, an IT administrator, or basically anybody with an IT background. With this training you will get everything you need to start working as a professional web penetration tester. But why would you want to become one? First of all because it is lot's of fun. You can be in the position of an attacker trying to hack various system. Finding vulnerabilities exploiting them and taking over the system. You can find the true hacker in yourself. It is a very creative and exciting job. Also the security business is booming now. I get offers every day on LinkedIn, because there is a serious shortage of penetration testers. As companies figure out that they really have to care about security they face the problem that they cannot find people to do that. And it just keeps growing. And because of that you can earn pretty well even as a white hat ethical hacker, so there is no reason to go to the dark side.
.
But why should you learn web hacking. Mostly because there is the biggest demand on the market. Wherever you go to work right now as a penetration tester, around 80 % of the projects are web hacking related. This usually because the awareness of web security was already established and because basically everything has a web interface from web application to embedded devices or IoT...
Facilities
Location
Start date
Online
Start date
Different dates availableEnrolment now open
About this course
Why hacking is fun
Understand web security problems and how to fix them
Find security vulnerabilities in web applications
Start working as a penetration tester for web applications
How traditional and modern web applications work
How the process of ethical hacking works
Get practical experience in exploiting web applications
How to do ethical hacking projects the right way
How professional penetration testing works
Developers who want to secure their web applications
People who want to become penetration tester
Penetration testers who want extend their portfolio to web applications
Anybody who work in IT or studies it and is interested in web hacking
Questions & Answers
Add your question
Our advisors and other users will be able to reply to you
We are verifying your question adjusts to our publishing rules. According to your answers, we noticed you might not be elegible to enroll into this course, possibly because of: qualification requirements, location or others. It is important you consult this with the Centre.
Thank you!
We are reviewing your question. We will publish it shortly.
Or do you prefer the center to contact you?
Reviews
Have you taken this course? Share your opinion
This centre's achievements
2021
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
Install
Communication Training
Private
Web
Hacking
Hacker
Protocol
Works
PHP
Javascript
HTML
Server
Linux
Javascript training
Course programme
Warm up
4 lectures09:58Introduction Introduction to the course.
Disclaimer Computer hacking is a sensitive topic, so there is nothing without a disclaimer.
Everything in this course is my private opinion and product. My employer has no connection to it.Methodology Introduction to the methodology of security assessments and what is covered by this course.Course Outline
Warm up
4 lectures09:58Introduction Introduction to the course.
Disclaimer Computer hacking is a sensitive topic, so there is nothing without a disclaimer.
Everything in this course is my private opinion and product. My employer has no connection to it.Methodology Introduction to the methodology of security assessments and what is covered by this course.Course OutlineIntroduction Introduction to the course.Introduction Introduction to the course.Introduction Introduction to the course.Introduction Introduction to the course.Introduction to the course.Introduction to the course.Disclaimer Computer hacking is a sensitive topic, so there is nothing without a disclaimer.
Everything in this course is my private opinion and product. My employer has no connection to it.
Disclaimer Computer hacking is a sensitive topic, so there is nothing without a disclaimer.
Everything in this course is my private opinion and product. My employer has no connection to it.
Disclaimer Computer hacking is a sensitive topic, so there is nothing without a disclaimer.
Everything in this course is my private opinion and product. My employer has no connection to it.
Disclaimer Computer hacking is a sensitive topic, so there is nothing without a disclaimer.
Everything in this course is my private opinion and product. My employer has no connection to it.
Computer hacking is a sensitive topic, so there is nothing without a disclaimer.
Everything in this course is my private opinion and product. My employer has no connection to it.
Computer hacking is a sensitive topic, so there is nothing without a disclaimer.
Everything in this course is my private opinion and product. My employer has no connection to it.
Methodology Introduction to the methodology of security assessments and what is covered by this course.
Methodology Introduction to the methodology of security assessments and what is covered by this course.
Methodology Introduction to the methodology of security assessments and what is covered by this course.
Methodology Introduction to the methodology of security assessments and what is covered by this course.
Introduction to the methodology of security assessments and what is covered by this course.
Introduction to the methodology of security assessments and what is covered by this course.
Course OutlineCourse OutlineCourse OutlineCourse Outline
Environment setup
5 lectures34:03In this section Introduces the contents of this section.Download resources Download all the resources for the rest of the course.Setting up the target We will setup the target server, which we will attack in the following sections.Setting up Kali We will install Kali linux, which we will use throughout the course.Setting up the Burp Suite We will install the newest Burp Suite in our Kali.
Environment setup
5 lectures34:03In this section Introduces the contents of this section.Download resources Download all the resources for the rest of the course.Setting up the target We will setup the target server, which we will attack in the following sections.Setting up Kali We will install Kali linux, which we will use throughout the course.Setting up the Burp Suite We will install the newest Burp Suite in our Kali.
In this section Introduces the contents of this section.
In this section Introduces the contents of this section.
In this section Introduces the contents of this section.
In this section Introduces the contents of this section.
Introduces the contents of this section.
Introduces the contents of this section.
Download resources Download all the resources for the rest of the course.
Download resources Download all the resources for the rest of the course.
Download resources Download all the resources for the rest of the course.
Download resources Download all the resources for the rest of the course.
Download all the resources for the rest of the course.
Download all the resources for the rest of the course.
Setting up the target We will setup the target server, which we will attack in the following sections.
Setting up the target We will setup the target server, which we will attack in the following sections.
Setting up the target We will setup the target server, which we will attack in the following sections.
Setting up the target We will setup the target server, which we will attack in the following sections.
We will setup the target server, which we will attack in the following sections.
We will setup the target server, which we will attack in the following sections.
Setting up Kali We will install Kali linux, which we will use throughout the course.
Setting up Kali We will install Kali linux, which we will use throughout the course.
Setting up Kali We will install Kali linux, which we will use throughout the course.
Setting up Kali We will install Kali linux, which we will use throughout the course.
We will install Kali linux, which we will use throughout the course.
We will install Kali linux, which we will use throughout the course.
Setting up the Burp Suite We will install the newest Burp Suite in our Kali.
Setting up the Burp Suite We will install the newest Burp Suite in our Kali.
Setting up the Burp Suite We will install the newest Burp Suite in our Kali.
Setting up the Burp Suite We will install the newest Burp Suite in our Kali.
We will install the newest Burp Suite in our Kali.
We will install the newest Burp Suite in our Kali.
Web 101
6 lectures01:21:30Web 101 - In this sectionHow HTTP works You will learn about the HTTP protocol, which is in the core of the web. You will be able to understand HTTP communication.Static HTML Starting from the basics of web sites you will learn how HTML works.PHP and friends We will write a simple PHP page to understand how that and similar technologies work.Modern MVC frameworks We will write a simple MVC application in python with Django, to get a general understanding about modern web frameworks.Javascript We will write Javascript to understand its concept.
Web 101.
6 lectures01:21:30Web 101 - In this sectionHow HTTP works You will learn about the HTTP protocol, which is in the core of the web. You will be able to understand HTTP communication.Static HTML Starting from the basics of web sites you will learn how HTML works.PHP and friends We will write a simple PHP page to understand how that and similar technologies work.Modern MVC frameworks We will write a simple MVC application in python with Django, to get a general understanding about modern web frameworks.Javascript We will write Javascript to understand its concept.
Web 101 - In this sectionWeb 101 - In this sectionWeb 101 - In this sectionWeb 101 - In this sectionHow HTTP works You will learn about the HTTP protocol, which is in the core of the web. You will be able to understand HTTP communication.
How HTTP works You will learn about the HTTP protocol, which is in the core of the web. You will be able to understand HTTP communication.
How HTTP works You will learn about the HTTP protocol, which is in the core of the web. You will be able to understand HTTP communication.
How HTTP works You will learn about the HTTP protocol, which is in the core of the web. You will be able to understand HTTP communication.
You will learn about the HTTP protocol, which is in the core of the web. You will be able to understand HTTP communication.
You will learn about the HTTP protocol, which is in the core of the web. You will be able to understand HTTP communication.
Static HTML Starting from the basics of web sites you will learn how HTML works.
Static HTML Starting from the basics of web sites you will learn how HTML works.
Static HTML Starting from the basics of web sites you will learn how HTML works.
Static HTML Starting from the basics of web sites you will learn how HTML works.
Starting from the basics of web sites you will learn how HTML works.
Starting from the basics of web sites you will learn how HTML works.
PHP and friends We will write a simple PHP page to understand how that and similar technologies work.
PHP and friends We will write a simple PHP page to understand how that and similar technologies work.
PHP and friends We will write a simple PHP page to understand how that and similar technologies work.
PHP and friends We will write a simple PHP page to understand how that and similar technologies work.
We will write a simple PHP page to understand how that and similar technologies work.
We will write a simple PHP page to understand how that and similar technologies work.
Modern MVC frameworks We will write a simple MVC application in python with Django, to get a general understanding about modern web frameworks.
Modern MVC frameworks We will write a simple MVC application in python with Django, to get a general understanding about modern web frameworks.
Modern MVC frameworks We will write a simple MVC application in python with Django, to get a general understanding about modern web frameworks.
Modern MVC frameworks We will write a simple MVC application in python with Django, to get a general understanding about modern web frameworks.
We will write a simple MVC application in python with Django, to get a general understanding about modern web frameworks.
We will write a simple MVC application in python with Django, to get a general understanding about modern web frameworks.
Javascript We will write Javascript to understand its concept SSL/TLS...
Additional information
Students need to have IT background
Virtual machines are used in the course, a user level understanding of VMWare or Virtualbox is needed