How to be an Independent security researcher /Ethical Hacker
2.5 (14 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,712 students enrolled
Wishlisted Wishlist

Please confirm that you want to add How to be an Independent security researcher /Ethical Hacker to your Wishlist.

Add to Wishlist

How to be an Independent security researcher /Ethical Hacker

If you are a web developer, Bug Hunter, hacker or any it security researcher then this course will be very help full.
2.5 (14 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,712 students enrolled
Created by Zia Ur Rehman
Last updated 2/2016
English
Curiosity Sale
Current price: $10 Original price: $105 Discount: 90% off
30-Day Money-Back Guarantee
Includes:
  • 4 hours on-demand video
  • 3 Articles
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • At the end of this course my students will be able to find vulnerabilities of xss and sql injections in their sites for their clients sites. They will become independent security researcher.
  • A complete Ethical Hacking and Penetration tester Course
View Curriculum
Requirements
  • Nothing just know to run apps on computer
  • 1. HTTP client server Architecture
  • 2. Basics of HTML and JS.
  • 3. Basics of PHP and ASP.net
  • If you know about some of these things then it will be more beneficial and will be easy for you
Description

This Course is about :

  1. Ethical Hacker
  2. Penetration tester
  3. What is xss?
  4. Why xss?
  5. Types of xss?
  6. What are the different sources of xss?
  7. Different context of xss?
  8. What is Sql Injection?
  9. Different Types of Sql injection.

Types of xss

  1. Persistent xss (stored xss)
  2. Non persistent xss reflected xss
  3. Dom based xss
  • We will discuss different xss example according owasp xss.
  • Why xss is so important?
  • What is internet safety?
  • What is network security?
  • COURSE REQUIREMENTS:
    1. Nothing just know to run apps on computer
    2. HTTP client server Architecture
    3. Basics of HTML and JS.
    4. Basics of PHP and ASPnet

    If you know about some of these things then it will be more beneficial and will be easy for your understanding this course.

    WHO SHOULD ATTEND?

    1. Ethical Hacker
    2. Penetration tester
    3. Security Researcher
    4. Web Developer
    5. Bug Hunter
    6. Hard Worker and If you want to make yourself do somethig
    Who is the target audience?
    • Security Researcher
    • Web Developer
    • Bug Hunter
    • Hard Worker and If you want to make yourself do somethig
    • A complete course for Ethical Hacker and Penetration tester
    Students Who Viewed This Course Also Viewed
    Curriculum For This Course
    42 Lectures
    05:19:44
    +
    Introduction of the Course
    4 Lectures 06:15

    For whom this course is designed

    Preview 1 page

    After the completion of this course you will be an independent security researcher and you can find vulnerabilities in your own sites and for your client sites.

    Website Security

    Why is website security essential?

    Why you should take this course ?

    We will tell you about XSS , Kali Linux , SQL Injection and a bonus of Wifi Hacking.

    For Whom we designed this course for

    1. Security researchers
    2. Website developers
    3. Bug Hunters
    Preview 01:43



    Introduction Quiz
    3 questions
    +
    Importance
    4 Lectures 16:56
    Concept and misconception
    03:09

    Why xss and its types
    03:47

    xss attacks
    06:16

    Sanitizing the Data
    03:44

    Quiz - 2
    3 questions
    +
    Motivation
    1 Lecture 04:27
    +
    Lab Setup
    5 Lectures 27:16
    Lab Setup breifing
    03:46

    How to install kali linux
    05:38

    How to install Vmware
    07:45

    How to install web for pentester Lab
    05:03

    How to install mutillidae
    05:04
    +
    Linux Command Line
    8 Lectures 01:03:09
    Linux commands introduction
    08:06

    Basic commands of kali linux - 1
    04:35

    Kali linux commands 2
    07:16

    kali linux commands 3
    07:59

    Kali linux commands 4
    12:14

    Kali Linux commands 5
    07:35

    Kali Linux command 6
    09:19

    Commands of the Kali Linux
    06:05

    Quiz of Kali Linux Command Line
    3 questions
    +
    Useful Addons
    4 Lectures 28:15
    Addons for Firefox
    00:06

    Addon for mozilla firefox browser
    05:59

    Firefox Addon 2
    10:40

    Firefox Addon 3
    11:30
    +
    Xss Manual
    7 Lectures 01:06:41
    Google dorks
    05:07

    Xss 1
    06:08

    Xss 2
    10:51

    Stored xss
    10:50

    Non Persistent Xss 2
    16:26

    Dom xss final
    06:34

    Xss Final
    10:45
    +
    Sql Injection Manual
    3 Lectures 17:57
    Google Dork Sql
    05:28

    Sql Injection
    05:06

    Sql Injection 1
    07:23
    +
    Automatic Tools for xss and Sql injection
    6 Lectures 17:02
    Auto Tool Netsparker
    06:22

    Auto tool Acuintix
    03:31

    Auto tool Vega
    04:46

    Final Words
    02:13

    Course PDF
    68 pages

    Bonus
    00:10
    About the Instructor
    Zia Ur Rehman
    2.5 Average rating
    28 Reviews
    2,413 Students
    2 Courses
    Instructer

    I've been playing with technology since I was a kid. At 13 I was building websites by hand in HTML and Front page 98 (which is how I learned what not to do) after that some by dream viewer . Since then I've been a computer addict and web programmer.

    I've always been an avid reader and insatiable learner, I started rearranging bits and bytes to make the computer behave the way I wanted, and help others understand the nonsense technology can be sometimes. Despite this love-hate relationship I've had with computers and the web, it is the thing I am most interested in and passionate about still after several decades of it. I can't get enough.

    After that i changed my field and became an independent security researcher . In start i have just do it for my self and for my own sites but with the time past some of my clients asked me for the protection of their sites so i started it for them.

    I searched a lot of material and get trained in this field now i am able to protect my sites and my friend or clients site from xss attacks and sql injection attacks.

    So let me Know if i can help you for any thing and have a blessed days.