Learn Ethical Hacking, Bugbounty Hunting & Pentesting
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1 student enrolled

Learn Ethical Hacking, Bugbounty Hunting & Pentesting

Learn to test Web Applications for Bugs both in manual and automation environment
New
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1 student enrolled
Created by Stanley Jones
Last updated 4/2020
English
English [Auto]
Current price: $16.99 Original price: $24.99 Discount: 32% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3.5 hours on-demand video
  • 18 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • How to hunt bugs in web applications
  • Ethical hacking
  • Penetration testing
  • Finding OWASP Top 10 Vulnerabilities in Websites
  • Practical Ethical Hacking and Penetration Testing Skills
  • Setting for Lap Environment for Security Testing
  • Usage of Kali Linux OS, BurpSuite, OWASP ZAP, Vega & Nikto Web Vulnerability Scanners
  • Gathering detailed information about the networks and the target applications
  • XSS, SQL Injection, Command Injection, CSRF, HTML Injection, File Upload, etc,.. Web Vulnerabilities
Requirements
  • A Computer/Laptop with minimum 4GB RAM and 2.4GHz Process
  • No Linux, Programming or hacking knowledge required
  • Good Internet Connection
  • Knowledge of using any Operating systems like Windows/Linux
Description

Hello, there! Here, you will learn how to hunt for bugs in the web applications. You will learn how to do penetration testing in the websites. You will find vulnerabilities in the websites and report them to the companies, and get paid for informing them with responsible disclosure program. It is my joy to share my knowledge and experience with you of hunting bugs in the real-world web applications and reporting them ethically. You will learn different kinds of hacking, where you can hack manually and automatically using the tools.

Who this course is for:
  • Developers
  • Beginner Ethical Hackers
  • Bugbounty Hunters
  • People who like Hacking
Course content
Expand all 17 lectures 03:20:51
+ Learning about the Prerequistes to get started & Setting up Lab
3 lectures 22:49
Installing Kali Linux and Owasp BWA Vulnerable application on you computer
07:19
Installing OWASP Zap, Sublime Text and Vega
10:13
+ Information Gathering
2 lectures 35:07
Finding Subdomains using Sublister and testing bugs using Nikto
13:42
+ Testing for Web Vulnerabilities
7 lectures 01:29:57
SQL Injection
18:41
Cross-site Scripting
19:06
Automating XSS on Web Pages
18:57
Cross-site Request Forgery
07:12
Command Injection
09:33
HTML Injection
07:32
Parameter Tampering
08:56
+ Automation of Web Application testing
3 lectures 35:44
Automate Testing using Burpsuite
17:08
Automate Testing using Owasp ZAP
10:17
Automate Testing using Vega
08:19