Website Hacking in Practice
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
Ethical Hacking Course: Website Hacking in Practice Training course
- finally published!
Welcome to Hacking School: Website Hacking in Practice course!
Before we begin – the practical use of the training you are going to see has been proven by vast group of people – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, black- and white hat hackers. Please, read carefully what we'd like to share with you.
The course covers all important hacking techniques used by hackers and system administrators. About the Ethical Hacking Training course (what you can expect):
WHAT YOU WILL LEARN in this Ethical Hacking Training:
IN EACH MODULE YOU WILL ALSO SEE HOW YOU CAN PROTECT YOUR WEBSITE OR WEB APPLICATION AGAINST EVERY VULNERABILITY DESCRIBED IN THE COURSE. MODULES ARE DIVIDED INTO: 1) THEORETICAL INTRODUCTION, 2) PRACTICAL ATTACK EXAMPLE, 3) SECURITY GUIDANCE.
WHAT YOU NEED TO KNOW BEFORE YOU BEGIN:
What you will find inside can also be used by beginners - thanks to live Video Training attached to the course. Almost every module covered inside has been presented by a professional web developer.
Please be advised that all the techniques presented in "Website Hacking in Practice" course can only be used ethically and in your own testing / researching environment. Note that you will get all the required tools and information to prepare your own training system. Please see the Legal information in the 1st section for further legal reference.
We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the "Website Hacking in Practice" training is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, we will give you full refund. No questions asked.
We wish you the best,
The Hacking School Team
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Section 1: Introduction|
Table of ContentsPreview
|Section 2: Environment setup and training system configuration|
Module 01. Introduction - Download ZIP package with source codes and examples
Module 01. Introduction and environment configuration - Video TrainingPreview
|Section 3: Basic techniques|
Module 02. Deep data hiding
Module 02. Deep data hiding - Video Training
Module 03. Brute-force and dictionary attacks
Module 03. Brute-force and dictionary attacks - Video Training
Module 04. Account lockout attack
Module 04. Account lockout attack - Video Training
|Section 4: Lets get deeper - data leaks|
Module 05. Web parameter tampering
Module 05. Web parameter tampering - Video Training
Module 06. Path and information disclosure
Module 06. Path and information disclosure - Video Training
Module 07. Forced browsing
Module 07. Forced browsing - Video Training
Module 08. Path traversal
Module 08. Path traversal - Video Training
Module 09. Unicode encoding
Module 10. Parameter delimiter
Module 10. Parameter delimiter - Video Training
|Section 5: Incjection attacks|
Module 11. PHP injection
Module 11. PHP injection - Video Training
Module 12. Direct static code injection
Module 12. Direct static code injection - Video Training
Module 13. SQL injection
Module 13. SQL injection - Video Training
|Section 6: XSS related attacks|
Module 14. XSS - Cross Site Scripting attack
Module 14. XSS - Cross Site Scripting attack - Video Training
Module 14B. XST - Cross Site Tracing attack
Module 14B. XST - Cross Site Tracing attack - Video Training
Module 15. XSRF - Cross Site Request Forgery attack
Module 15. XSRF - Cross Site Request Forgery attack - Video Training
|Section 7: More advanced techniques|
Module 16. Spying on data with a browser
Module 16. Spying on data with a browser - Video Training
Module 17. Session hijacking
Module 17. Session hijacking - Video Training
Module 18. Session fixation
Module 18. Session fixation - Video Training
|Section 8: Phishing|
Module 19. Phishing
Module 19. Phishing - Video Training
|Section 9: Security testing in practice|
Module 20. Automated security testing
Module 20. Automated security testing - Video Training
|Section 10: Summary|
Summary and references
The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.
We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.
IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.