Buying for a Team? Gift This Course
Wishlisted Wishlist

Please confirm that you want to add How to be an Independent security researcher /Ethical Hacker to your Wishlist.

Add to Wishlist

How to be an Independent security researcher /Ethical Hacker

If you are a web developer, Bug Hunter, hacker or any it security researcher then this course will be very help full.
2.5 (14 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,708 students enrolled
Created by Zia Ur Rehman
Last updated 2/2016
$10 $105 90% off
4 days left at this price!
30-Day Money-Back Guarantee
  • 4 hours on-demand video
  • 3 Articles
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?

This Course is about :

  1. Ethical Hacker
  2. Penetration tester
  3. What is xss?
  4. Why xss?
  5. Types of xss?
  6. What are the different sources of xss?
  7. Different context of xss?
  8. What is Sql Injection?
  9. Different Types of Sql injection.

Types of xss

  1. Persistent xss (stored xss)
  2. Non persistent xss reflected xss
  3. Dom based xss
  • We will discuss different xss example according owasp xss.
  • Why xss is so important?
  • What is internet safety?
  • What is network security?
    1. Nothing just know to run apps on computer
    2. HTTP client server Architecture
    3. Basics of HTML and JS.
    4. Basics of PHP and ASPnet

    If you know about some of these things then it will be more beneficial and will be easy for your understanding this course.


    1. Ethical Hacker
    2. Penetration tester
    3. Security Researcher
    4. Web Developer
    5. Bug Hunter
    6. Hard Worker and If you want to make yourself do somethig
    Who is the target audience?
    • Security Researcher
    • Web Developer
    • Bug Hunter
    • Hard Worker and If you want to make yourself do somethig
    • A complete course for Ethical Hacker and Penetration tester
    Students Who Viewed This Course Also Viewed
    What Will I Learn?
    At the end of this course my students will be able to find vulnerabilities of xss and sql injections in their sites for their clients sites. They will become independent security researcher.
    A complete Ethical Hacking and Penetration tester Course
    View Curriculum
    • Nothing just know to run apps on computer
    • 1. HTTP client server Architecture
    • 2. Basics of HTML and JS.
    • 3. Basics of PHP and
    • If you know about some of these things then it will be more beneficial and will be easy for you
    Curriculum For This Course
    Expand All 42 Lectures Collapse All 42 Lectures 05:19:44
    Introduction of the Course
    4 Lectures 06:15

    For whom this course is designed

    Preview 1 page

    After the completion of this course you will be an independent security researcher and you can find vulnerabilities in your own sites and for your client sites.

    Website Security

    Why is website security essential?

    Why you should take this course ?

    We will tell you about XSS , Kali Linux , SQL Injection and a bonus of Wifi Hacking.

    For Whom we designed this course for

    1. Security researchers
    2. Website developers
    3. Bug Hunters
    Preview 01:43

    Introduction Quiz
    3 questions
    4 Lectures 16:56
    Concept and misconception

    Why xss and its types

    xss attacks

    Sanitizing the Data

    Quiz - 2
    3 questions
    1 Lecture 04:27
    Lab Setup
    5 Lectures 27:16
    Lab Setup breifing

    How to install kali linux

    How to install Vmware

    How to install web for pentester Lab

    How to install mutillidae
    Linux Command Line
    8 Lectures 01:03:09
    Linux commands introduction

    Basic commands of kali linux - 1

    Kali linux commands 2

    kali linux commands 3

    Kali linux commands 4

    Kali Linux commands 5

    Kali Linux command 6

    Commands of the Kali Linux

    Quiz of Kali Linux Command Line
    3 questions
    Useful Addons
    4 Lectures 28:15
    Addons for Firefox

    Addon for mozilla firefox browser

    Firefox Addon 2

    Firefox Addon 3
    Xss Manual
    7 Lectures 01:06:41
    Google dorks

    Xss 1

    Xss 2

    Stored xss

    Non Persistent Xss 2

    Dom xss final

    Xss Final
    Sql Injection Manual
    3 Lectures 17:57
    Google Dork Sql

    Sql Injection

    Sql Injection 1
    Automatic Tools for xss and Sql injection
    6 Lectures 17:02
    Auto Tool Netsparker

    Auto tool Acuintix

    Auto tool Vega

    Final Words

    Course PDF
    68 pages

    About the Instructor
    2.5 Average rating
    28 Reviews
    2,408 Students
    2 Courses

    I've been playing with technology since I was a kid. At 13 I was building websites by hand in HTML and Front page 98 (which is how I learned what not to do) after that some by dream viewer . Since then I've been a computer addict and web programmer.

    I've always been an avid reader and insatiable learner, I started rearranging bits and bytes to make the computer behave the way I wanted, and help others understand the nonsense technology can be sometimes. Despite this love-hate relationship I've had with computers and the web, it is the thing I am most interested in and passionate about still after several decades of it. I can't get enough.

    After that i changed my field and became an independent security researcher . In start i have just do it for my self and for my own sites but with the time past some of my clients asked me for the protection of their sites so i started it for them.

    I searched a lot of material and get trained in this field now i am able to protect my sites and my friend or clients site from xss attacks and sql injection attacks.

    So let me Know if i can help you for any thing and have a blessed days.

    Report Abuse