CWHH Level 2 - Break the Security ( CWHH-BTS)

Advanced Ethical Hacking, penetration testing, vulnerability assessment, Metasploit intranet hacking, JBOSS hacking
4.2 (17 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,733 students enrolled
$20
Take This Course
  • Lectures 51
  • Contents Video: 4 hours
    Other: 1.5 hours
  • Skill Level Expert Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 8/2014 English

Course Description

The course teaches ethical hacking at intermediate level to students. The students can type Ethical hacking, White Hat Hacker, Hacking Courses to find the course. It may take a weeks time to complete the course. We have supplementary material which can be used by students to learn more about the subject. The course is structured to introduce to students various tools and techniques which are used by hackers to intrude into webportals, networks, end user machines. The course can also give an insight on how to protect from these methods of intrusion. This course is useful to everyone who wants to protect data on his computer or companies network. The course covers JBOSS(mostly used by corporate/banks), BlindSQL injection, Javadriveby used by hackers, RAT used by hackers to hack into end user machines, Wireless attacks using Android phone, DOM XSS vulnerabilities in applications

What are the requirements?

  • Windows or linux machine, VirtualBox, Kali ISO loaded in virtual box

What am I going to get from this course?

  • In this course you will learn advanced hacking tools and techniques
  • web penetration testing tools
  • network penetration testing tools
  • advanced hacking using metasploit
  • JBOSS server hacking

What is the target audience?

  • All IT Managers, IT Admins, CISO, System admins, network admins, college students

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Lab setup
Lab setup
15:40
Section 2: BurpSuite
Presentation - Intruder
Preview
01:54
Practical DEMO - Intruder
07:31
Burpsuite - Spider, Repeater, Comparer
04:38
Section 3: Wordpress Scan -WPScan
WPScan - Presentation
Preview
03:35
WpScan - Practical Demo
04:15
Section 4: Blind SQL Injection
Blind SQL injection Presentation
03:43
Blind SQL Injection DEMO 1
03:26
Blind Sqlmap - DEMO 2
05:25
Section 5: Hydra - Authentication Password Breaker
Hydra - Presentation
Preview
01:53
Hydra - Demo Commandline
03:04
Hydra DEMO GUI
03:59
Section 6: XSF - Flashing cross script
XSF Presentations
Preview
9 pages
XSF Theory Presentations
02:21
XSF DEMO
05:06
Section 7: DOM XSS
DOM XSS
11 pages
DOM presentations
Preview
07:12
DOM XSS DEMO
01:43
Section 8: Heart Bleed - SSL Server Exploitation
Heart Bleed PDF
Preview
8 pages
Heart Bleed Presentation
03:12
HeartBleed Setup
Preview
03:01
HeartBleed DEMO
07:25
Section 9: ModSecurity - Web application firewall
ModSecurity - WAF
8 pages
Modsecurity presentation
02:36
Modsecurity Demo
08:14
Modsecurity - Enabling Advanced Features
03:23
Modsecurity Custom Rules - part 1
08:02
Modsecurity custom rules - Part 2
06:33
Section 10: Maltego
Maltego Presentation
Preview
8 pages
Maltego Presentation Audio
Preview
03:56
Maltego Demo
04:43
Section 11: WordPress Security
WP Security
17 pages
WP Security
Preview
08:21
WP Security DEMO
40:43
Section 12: Insecure Direct Object Reference
Insecure Direct Object Reference
8 pages
Insecure Direct Object Reference
03:26
Insecure Direct Object Reference DEMO
04:33
Section 13: Misc - What hackers use!
JavaDriveby theory
Preview
03:26
Javadriveby DEMO
08:03
Remote Administration Tool Presentation
Preview
02:10
Remote Administration Tool DEMO
09:21
Section 14: Wireless Attack using Android Phones
Dsploit - Presentation
Preview
02:48
Dsploit Demo
09:36
Section 15: JBOSS Server Attacks
JBOSS Presentation PDF
Preview
22 pages
JBOSS Theory
Preview
07:35
JBOSS Manual Method
Preview
06:55
JBOSS - Exploiting using Deployment File Repository (JSP)
02:03
JBOSS - Exploiting using BSH Script - Manual Method
03:59
JBOSS - Exploiting using BSH Script - Metasploit Module
02:54
JBOSS - Exploit bypassing authentication using HEAD method
06:54
External Links for study
Article
Section 16: Certification
Quiz1
13 questions
Quiz2
10 questions

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Cyber Security and Privacy Foundation Pte Ltd. is a Consulting, Services & Training Company based in Singapore. We do Vulnerability Assessment, Penetration Testing, Web Application Security Testing, Mobile Application Security Testing and Cyber Security Training. We do zero day security assessment and APT analysis and technical security certifications for organisation.

Cyber Security & Privacy Foundation, India is setup with objective to do non commercial work. It has around 14000+ members and almost 9000+ students and CISO's of major companies on its board. We are involved in active research in field on cyber security, web portal security management, product research which is useful for all computer users.

J Prasanna : 20+ year full time experience in field of computer security. He has worked for anti virus companies & run my own consulting companies. He have worked on standards implementation, consulting, testing, handled team of security experts, coders & networking experts. Can provide value to any organization by thinking out of box,implementing ideas from conceptual stage. Great networking ability, have handled media relating to Cyber security issue on many occasions and good at training(both technical, non technical subjects). Taking ownership, delivering results, crisis management and cross functional skills are key strengths.

Specialties: Managing technical team, handling delivery & taking ownership of team. Virus analysis, Antivirus & Security products testing, Application security design & review, Secure enterprise architecture & design, ISO 27001 Standards implementation, Training. Presented in various CII conference on Cyber Security and Defense IT consultative committee(DITCC). He has Got numerous commendations from Indian army. He has done guest lecturing for various law enforcement and military academy in india.


Ready to start learning?
Take This Course