Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
The course teaches ethical hacking at intermediate level to students. The students can type Ethical hacking, White Hat Hacker, Hacking Courses to find the course. It may take a weeks time to complete the course. We have supplementary material which can be used by students to learn more about the subject. The course is structured to introduce to students various tools and techniques which are used by hackers to intrude into webportals, networks, end user machines. The course can also give an insight on how to protect from these methods of intrusion. This course is useful to everyone who wants to protect data on his computer or companies network. The course covers JBOSS(mostly used by corporate/banks), BlindSQL injection, Javadriveby used by hackers, RAT used by hackers to hack into end user machines, Wireless attacks using Android phone, DOM XSS vulnerabilities in applications
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Lab setup|
|Section 2: BurpSuite|
Presentation - IntruderPreview
Practical DEMO - Intruder
Burpsuite - Spider, Repeater, Comparer
|Section 3: Wordpress Scan -WPScan|
WPScan - PresentationPreview
WpScan - Practical Demo
|Section 4: Blind SQL Injection|
Blind SQL injection Presentation
Blind SQL Injection DEMO 1
Blind Sqlmap - DEMO 2
|Section 5: Hydra - Authentication Password Breaker|
Hydra - PresentationPreview
Hydra - Demo Commandline
Hydra DEMO GUI
|Section 6: XSF - Flashing cross script|
XSF Theory Presentations
|Section 7: DOM XSS|
DOM XSS DEMO
|Section 8: Heart Bleed - SSL Server Exploitation|
Heart Bleed PDFPreview
Heart Bleed Presentation
|Section 9: ModSecurity - Web application firewall|
ModSecurity - WAF
Modsecurity - Enabling Advanced Features
Modsecurity Custom Rules - part 1
Modsecurity custom rules - Part 2
|Section 10: Maltego|
Maltego Presentation AudioPreview
|Section 11: WordPress Security|
WP Security DEMO
|Section 12: Insecure Direct Object Reference|
Insecure Direct Object Reference
Insecure Direct Object Reference
Insecure Direct Object Reference DEMO
|Section 13: Misc - What hackers use!|
Remote Administration Tool PresentationPreview
Remote Administration Tool DEMO
|Section 14: Wireless Attack using Android Phones|
Dsploit - PresentationPreview
|Section 15: JBOSS Server Attacks|
JBOSS Presentation PDFPreview
JBOSS Manual MethodPreview
JBOSS - Exploiting using Deployment File Repository (JSP)
JBOSS - Exploiting using BSH Script - Manual Method
JBOSS - Exploiting using BSH Script - Metasploit Module
JBOSS - Exploit bypassing authentication using HEAD method
External Links for study
|Section 16: Certification|
Cyber Security and Privacy Foundation Pte Ltd. is a Consulting, Services & Training Company based in Singapore. We do Vulnerability Assessment, Penetration Testing, Web Application Security Testing, Mobile Application Security Testing and Cyber Security Training. We do zero day security assessment and APT analysis and technical security certifications for organisation.
Cyber Security & Privacy Foundation, India is setup with objective to do non commercial work. It has around 14000+ members and almost 9000+ students and CISO's of major companies on its board. We are involved in active research in field on cyber security, web portal security management, product research which is useful for all computer users.
J Prasanna : 20+ year full time experience in field of computer security. He has worked for anti virus companies & run my own consulting companies. He have worked on standards implementation, consulting, testing, handled team of security experts, coders & networking experts. Can provide value to any organization by thinking out of box,implementing ideas from conceptual stage. Great networking ability, have handled media relating to Cyber security issue on many occasions and good at training(both technical, non technical subjects). Taking ownership, delivering results, crisis management and cross functional skills are key strengths.
Specialties: Managing technical team, handling delivery & taking ownership of team. Virus analysis, Antivirus & Security products testing, Application security design & review, Secure enterprise architecture & design, ISO 27001 Standards implementation, Training. Presented in various CII conference on Cyber Security and Defense IT consultative committee(DITCC). He has Got numerous commendations from Indian army. He has done guest lecturing for various law enforcement and military academy in india.