Ethical Hacking: Learn the Fundamentals of Web Security
4.0 (51 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,978 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Ethical Hacking: Learn the Fundamentals of Web Security to your Wishlist.

Add to Wishlist

Ethical Hacking: Learn the Fundamentals of Web Security

Learn the fundamental of ethical hacking and how to protect your own applications for security issues
4.0 (51 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,978 students enrolled
Created by John C.
Last updated 5/2017
English
English
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn how hackers exploit these weaknesses
  • Defensive coding for preventing attacks
  • Learn to evaluate app security
  • Learn the most common website vulnerabilities
View Curriculum
Requirements
  • Basic understanding of SQL
  • Basic knowledge of Ruby on Rails
  • Ability to read JavaScript code
Description

This course will start you down the path of becoming a Web Security professional or a Ethical Hacker. You learn the fundamental of ethical hacking and how to protect your own applications for security issues as a Web Security profession.

You will learn to start thinking and looking at your web applications through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. You'll learn ethical hacking techniques and you'll understand how to detect and identify risks in web applications. 

We'll take a look at the different attack vectors that hackers use, how web apps are typically attacked, and we'll also look at countermeasures and defenses.

This course is designed to teach you the skills and techniques required to test web applications. 

This course uses a combination of lecture, real-world experiences, and hands-on exercises to educate you in the techniques used to test the security of web application.

By the end of this class, students should be able to assess web applications for security holes and come away with a variety of ethical hacking techniques that can be used in the real world. 

Who is the target audience?
  • Application Testers
  • Rails Developers
  • Anyone who writes web applications
Students Who Viewed This Course Also Viewed
Curriculum For This Course
18 Lectures
01:21:16
+
The Proxy
3 Lectures 21:38
Proxies
06:21

Intercepting Requests with Burp
11:45

+
Bruteforcing
6 Lectures 32:26
Usernames and Passwords
03:45

Harvesting Emails
01:47

Password Attacks
12:57

Fixing Error Messages
03:53

Enforcing Strong Passwords
03:24

Preventing Brute Force Attacks
06:40
+
Breaking Authorization Controls
6 Lectures 18:59
Trusting Users
03:16

Securing Request Parameters
03:25

Searching For Vulnerabilities
04:07

Finding Hidden Pages
01:54

Automating File and Directory Discovery with Dirbuster
03:31

Enforcing Admin Access
02:46
About the Instructor
John C.
4.0 Average rating
51 Reviews
3,978 Students
1 Course
Web Security professional

I'm a Senior IT Security Specialist, DevOps Engineer, Linux and Windows System Administrator having more than 10+ years industrial experience and holding CEH, CISA, CISSP , AWS Architecture and Red Hat Certifications. I specialize in different types of Web application/ Server/ and Network Infrastructure Vulnerability Assessment which includes OWASP TOP 10, SANS TOP 20, PCI-DSS Compliance, and Social Engineering. I also consult my clients to get certified with ISSAF standards, SOC 2, FedRAMP, COBIT, HIPAA, ISO 27001/27002, NIST, IRS PUB 1075 and various other security frameworks. Penetration Testing, Malware removing, Computer Forensics, Code Auditing, Ethical Hacking, Encryption, SSL and VPN configuration are some of the other security related services that I provide.