4.16 out of 5
4.16
205 reviews on Udemy

Pentesting and Securing Web Applications (Ethical Hacking)

Learn to pentest the most used medium in the world with timeless principals and some of the latest techniques!
Instructor:
Daniel Slater
23,636 students enrolled
English [Auto]
Teach the 10% of computer security that gives 90% of the benefit
Advanced penetration testing techniques
How to write secure web apps
Computer security fundamentals
How to secure and exploit the OWASP Top 10

Computer security is one of the biggest job gaps in history, with a shortage of 3.5 million skilled workers needing to tackle a problem estimated to be worth $6 trillion. This is one of the biggest opportunities in history.

When I was at university I did a lot of security courses and to be honest I was pretty frustrated at how they were taught. The concepts and their importance captured my imagination but I knew it could be taught in a better way… so I created a few YouTube videos on the topic. They were very well received… So well received that after a few years working in industry I decided to make this course.

Although this course covers practical methods for breaking into and securing systems, most of the lectures focus on principals which allow you to properly understand the concepts. This differs from a lot of courses on Udemy that teach specific tools that will be out of date next year. This course is designed to teach the next thought leaders of the industry… ones who are capable of making tools that make everything before it seem outdated.

This course covers all the topics of several of my courses at university. It’s not long, it’s light hearted, and doesn’t feel dense… but all the content is there.

Injection

1
Be Ethical. Never Hack.
2
Never Hack

Written version of previous video.

3
Injection Intro
4
SQL Injection
5
XML Injection
6
Library Bloat
7
Cross Site Scripting (XSS)
8
Injection Defense
9
Do I need to worry about injection here?

A series of scenarios where we might have to care about injection.

10
Pentesting using injection

Core Knowledge

1
Common Terms
2
Phishing
3
Ethics & Legality
4
Basics
5
Attack Surface
6
0 days
7
Brute Force
8
Misconceptions
9
Core Knowledge Quiz

Security Mindset

1
Security Mindset

Client Side and Server Side

1
Client and Server Side
2
Client and Server Side Quiz

Authentication and Access Control

1
Authentication and Access Control
2
Authentication and Access Control Quiz

Cryptography

1
What is a Cryptographic Hash?
2
How is Hashing Useful?
3
Hash Attacks
4
Cryptographic Hash Defense
5
Encryption
6
Cryptography Quiz

Cross Site Request Forgery

1
Cross Site Request Forgery
2
CSRF Quiz

Deployment

1
DDoS - Distributed Denial of Service
2
Configuration
3
Passwords
4
Deployment Quiz

External Packages

1
External Packages
2
Implement or Import?
3
External Packages Quiz

Monitoring and Response

1
Shocking Figures
2
Identifying an Attack
3
Honeypots
4
Breach Response and Defense
5
Monitoring and Response Quiz
6
Create a Breach Response Plan

Conclusion

1
OWASP Top 10
2
Conclusion
You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.2
4.2 out of 5
205 Ratings

Detailed Rating

Stars 5
92
Stars 4
52
Stars 3
45
Stars 2
5
Stars 1
11
fc30c329344b6b9fee6704cf162dec79
Course available for 2 days
30-Day Money-Back Guarantee

Includes

4 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion
Never Miss Any Course Join Our Telegram Channel Join Channel
+ +