The All-in-One Ethical Hacking & Penetration Testing Bundle

4 Reviews
574 Enrolled
9 Courses & 46 Hours
$29.99$1,800.00
You save 98% -

What's Included

Hacking Web Applications & Penetration Testing: Fast Start
  • Experience level required: Beginner
  • Access 58 lectures & 4 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

58 Lessons (4h)

  • Your First Program

  • Introduction

    1 - Introduction1:19
    2 - Virtual Platforms1:29
    3 - Enabling Virtualization (VT-x or AMD-V) in BIOS
    4 - Lab's Architecture Diagram2:11
    5 - Using VirtualBox vs VMware
    6 - Install & Run Oracle VM VirtualBox5:02
    7 - Installing Kali using the VMware Image - Step 13:13
    8 - Installing Kali using the VMware Image - Step 24:47
    9 - Installing Kali using the VMware Image - Step 34:30
    10 - Installing Kali using the ISO file for VMware - Step 11:26
    11 - Installing Kali using the ISO file for VMware - Step 26:48
    12 - Installing Kali using the ISO file for VMware - Step 32:41
    13 - Installing Kali on VirtualBox using the OVA file - Step 13:14
    14 - Installing Kali on VirtualBox using the OVA file - Step 26:44
    15 - Installing Kali on VirtualBox using the OVA file - Step 34:11
    16 - Installing Kali using the ISO file for VirtualBox - Step 11:26
    17 - Installing Kali using the ISO file for VirtualBox - Step 26:49
    18 - Installing Kali using the ISO file for VirtualBox - Step 34:23
    19 - Download & Install OWASPBWA4:30
    20 - Accessing OWASP BWA0:54
    21 - Configuring NAT Network in Oracle VM VirtualBox1:07
    22 - Test VMs If They see Each Other2:58
  • Technologies & Standards

    23 - Basic Terms & Standards5:35
    24 - HTTP Protocol Basics and SSL7:03
    25 - Intercepting HTTP Traffic with Burp Suite3:46
    26 - Intercepting HTTPS Traffic with Burp Suite2:50
    27 - Web Attacks Classification1:36
  • An Automated Tool: OWASP ZAP (Zed Attack Proxy)

    28 - Introduction to OWASP ZAP3:06
    29 - Installation of OWASP ZAP & a Quick Scan6:25
    30 - Using OWASP ZAP as a Personal Proxy4:40
    31 - Intercepting HTTPS Traffics with OWASP ZAP2:17
    32 - Scanning a Website Which Requires Authentication14:46
  • Information Gathering & Configuration Management

    33 - Information Gathering & Configuration Management Part 15:09
    34 - Information Gathering & Configuration Management Part 24:26
  • Input - Output Manipulation

    35 - SOP, Javascript and Input-Output Validation7:42
    36 - XSS (Cross Site Scripting) - Reflected XSS4:05
    37 - XSS (Cross Site Scripting) - Stored and DOM Based XSS7:01
    38 - BeEF - The Browser Exploitation Framework5:39
    39 - SQL Injection Part 14:20
    40 - SQL Injection Part 24:41
    41 - SQL Injection Part 35:20
  • Authentication and Authorization

    42 - Authentication5:36
    43 - Authentication Attacks5:13
    44 - An Online Dictionary Attack with Hydra10:01
    45 - Authorization5:18
    46 - Path Traversal Demo3:40
  • Session Management and Cross Site Request Forgery

    47 - Session Management3:03
    48 - Session Fixation & Demo4:22
    49 - Cross Site Request Forgery5:12
  • Information Gathering Through the Internet

    50 - Introduction6:00
    51 - Using Search Engines & Google Hacking to Gather Information3:36
    52 - Search Engine Tools: SiteDigger and SearchDiggity3:59
    53 - Shodan2:50
    54 - Gathering Information About the People2:52
    55 - Web Archives1:53
    56 - FOCA Fingerprinting Organisations with Collected Archives7:41
    57 - The Harvester & Recon-NG3:15
    58 - Maltego - Visual Link Analysis Tool4:38

Hacking Web Applications & Penetration Testing: Fast Start

OA
Oak Academy

Oak Academy | Long Live Tech Knowledge

4.4/5 Instructor Rating: ★ ★ ★ ★
Oak Academy is a group of tech experts who have been in the sector for years and years. Deeply rooted in the tech world, they know that the tech industry's biggest problem is the "tech skills gap" and their online course are their solution. They specialize in critical areas like cybersecurity, coding, IT, game development, app monetization, and mobile. Thanks to their practical alignment, they are able to constantly translate industry insights into the most in-demand and up-to-date courses.

Description

This course is for beginners, so you don’t need to have previous knowledge about hacking, penetration testing, or application development. You’ll learn how to “ethically” hack websites from scratch. You will have the hands-on practices to discover and exploit the most common vulnerabilities such as SQL injection, XSS (Cross-Site Scripting), and CSRF (Cross-Site Request Forgery). You'll learn basic lab environment setup and the basic terms, standards, technologies, and protocols of web applications: HTML, URL, HTTP, and more. You will learn how to find out the vulnerabilities and learn how to exploit and hack those weaknesses.

4.3/5 average rating: ★ ★ ★ ★

  • Access 58 lectures & 4 hours of content 24/7
  • Find out & exploit the most common vulnerabilities such as SQL injection, XSS, and CSRF
  • Set up a lab environment & install the needed virtual machines
  • Learn the basic terms, standards, technologies & protocols of web applications: HTML, URL, HTTP, etc.
  • Use search engines to find out if there are known-vulnerabilities in the website
  • Analyze configurations to understand if they cause any vulnerability
  • Manipulate input fields & the outputs produced by the application
  • Discover authorization, authentication & session management flaws
IMPORTANT: This course is created for educational purposes and all the information learned should be used when the attacker is authorized.

Specs

Important Details

  • Length of time users can access this course: lifetime
  • Access options: desktop & mobile
  • Certificate of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: beginner

Requirements

  • Any device with basic specifications

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.