How to be an Independent security researcher /Ethical Hacker

If you are a web developer, Bug Hunter, hacker or any it security researcher then this course will be very help full.
3.5 (64 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,697 students enrolled
$19
$105
82% off
Take This Course
  • Lectures 42
  • Length 5.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 5/2015 English

Course Description

This Course is about :

  1. Ethical Hacker
  2. Penetration tester
  3. What is xss?
  4. Why xss?
  5. Types of xss?
  6. What are the different sources of xss?
  7. Different context of xss?
  8. What is Sql Injection?
  9. Different Types of Sql injection.

Types of xss

  1. Persistent xss (stored xss)
  2. Non persistent xss reflected xss
  3. Dom based xss
  • We will discuss different xss example according owasp xss.
  • Why xss is so important?
  • What is internet safety?
  • What is network security?
  • COURSE REQUIREMENTS:
    1. Nothing just know to run apps on computer
    2. HTTP client server Architecture
    3. Basics of HTML and JS.
    4. Basics of PHP and ASPnet

    If you know about some of these things then it will be more beneficial and will be easy for your understanding this course.

    WHO SHOULD ATTEND?

    1. Ethical Hacker
    2. Penetration tester
    3. Security Researcher
    4. Web Developer
    5. Bug Hunter
    6. Hard Worker and If you want to make yourself do somethig

    What are the requirements?

    • Nothing just know to run apps on computer
    • 1. HTTP client server Architecture
    • 2. Basics of HTML and JS.
    • 3. Basics of PHP and ASP.net
    • If you know about some of these things then it will be more beneficial and will be easy for you

    What am I going to get from this course?

    • At the end of this course my students will be able to find vulnerabilities of xss and sql injections in their sites for their clients sites. They will become independent security researcher.
    • A complete Ethical Hacking and Penetration tester Course

    What is the target audience?

    • Security Researcher
    • Web Developer
    • Bug Hunter
    • Hard Worker and If you want to make yourself do somethig
    • A complete course for Ethical Hacker and Penetration tester

    What you get with this course?

    Not for you? No problem.
    30 day money back guarantee.

    Forever yours.
    Lifetime access.

    Learn on the go.
    Desktop, iOS and Android.

    Get rewarded.
    Certificate of completion.

    Curriculum

    Section 1: Introduction of the Course
    1 page

    For whom this course is designed

    01:43

    After the completion of this course you will be an independent security researcher and you can find vulnerabilities in your own sites and for your client sites.

    Website Security

    Why is website security essential?

    Why you should take this course ?

    We will tell you about XSS , Kali Linux , SQL Injection and a bonus of Wifi Hacking.

    For Whom we designed this course for

    1. Security researchers
    2. Website developers
    3. Bug Hunters
    Why This Course Is Designed
    Preview
    01:59
    Overview
    Preview
    02:33
    Introduction Quiz
    3 questions
    Section 2: Importance
    Concept and misconception
    03:09
    Why xss and its types
    03:47
    xss attacks
    06:16
    Sanitizing the Data
    03:44
    Quiz - 2
    3 questions
    Section 3: Motivation
    Motivation for the students
    Preview
    04:27
    Section 4: Lab Setup
    Lab Setup breifing
    03:46
    How to install kali linux
    05:38
    How to install Vmware
    07:45
    How to install web for pentester Lab
    05:03
    How to install mutillidae
    05:04
    Section 5: Linux Command Line
    Linux commands introduction
    08:06
    Basic commands of kali linux - 1
    04:35
    Kali linux commands 2
    07:16
    kali linux commands 3
    07:59
    Kali linux commands 4
    12:14
    Kali Linux commands 5
    07:35
    Kali Linux command 6
    09:19
    Commands of the Kali Linux
    Article
    Quiz of Kali Linux Command Line
    3 questions
    Section 6: Useful Addons
    Addons for Firefox
    Article
    Addon for mozilla firefox browser
    05:59
    Firefox Addon 2
    10:40
    Firefox Addon 3
    11:30
    Section 7: Xss Manual
    Google dorks
    05:07
    Xss 1
    06:08
    Xss 2
    10:51
    Stored xss
    10:50
    Non Persistent Xss 2
    16:26
    Dom xss final
    06:34
    Xss Final
    10:45
    Section 8: Sql Injection Manual
    Google Dork Sql
    05:28
    Sql Injection
    05:06
    Sql Injection 1
    07:23
    Section 9: Automatic Tools for xss and Sql injection
    Auto Tool Netsparker
    06:22
    Auto tool Acuintix
    03:31
    Auto tool Vega
    04:46
    Final Words
    02:13
    Course PDF
    68 pages
    Bonus
    Article

    Students Who Viewed This Course Also Viewed

    • Loading
    • Loading
    • Loading

    Instructor Biography

    Zia Ur Rehman, Instructer

    I've been playing with technology since I was a kid. At 13 I was building websites by hand in HTML and Front page 98 (which is how I learned what not to do) after that some by dream viewer . Since then I've been a computer addict and web programmer.

    I've always been an avid reader and insatiable learner, I started rearranging bits and bytes to make the computer behave the way I wanted, and help others understand the nonsense technology can be sometimes. Despite this love-hate relationship I've had with computers and the web, it is the thing I am most interested in and passionate about still after several decades of it. I can't get enough.

    After that i changed my field and became an independent security researcher . In start i have just do it for my self and for my own sites but with the time past some of my clients asked me for the protection of their sites so i started it for them.

    I searched a lot of material and get trained in this field now i am able to protect my sites and my friend or clients site from xss attacks and sql injection attacks.

    So let me Know if i can help you for any thing and have a blessed days.

    Ready to start learning?
    Take This Course