Website Hacking in Practice

Ethical hacking training is dedicated to programmers and website administrators. Website security unleashed
12 reviews
TAUGHT BY
  • Hacking School IT Security Experts - We turn beginners into professionals.

    The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

    We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

  • IT Security Academy IT Security Certified Professional

    IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

WHAT'S INSIDE
  • Lifetime access to 45 lectures
  • 7+ hours of high quality content
  • A community of 3400+ students learning together!
SHARE

Website Hacking in Practice

Ethical hacking training is dedicated to programmers and website administrators. Website security unleashed
12 reviews

HOW UDEMY WORKS?

Discover courses made by experts from around the world.

Take your courses with you and learn anytime, anywhere.

Learn and practice real-world skills and achieve your goals.

COURSE DESCRIPTION

Ethical Hacking Course: Website Hacking in Practice Training course

- finally published!

Welcome to Hacking School: Website Hacking in Practice course!

Before we begin – the practical use of the training you are going to see has been proven by vast group of people – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, black- and white hat hackers. Please, read carefully what we'd like to share with you.

The course covers all important hacking techniques used by hackers and system administrators. About the Ethical Hacking Training course (what you can expect):

  • It is a step by step training on Website and Web-application ethical hacking and security.
  • It covers almost all of the Top 10 Most Critical Web Application Attacks presented yearly by OWASP organization (Open Web Application Security Project) + 10 common techniques / vulnerabilities more.
  • It can be treated as a valuable source of knowledge for any white hat hacker, web developer, system administrator or IT security consultant.
  • You will learn how to hack using 21 interesting techniques and see how each of them can be used in a practical real-life example.
  • You will get access to all the lectures in PDF format and live Ethical Hacking Video Training sessions you can watch on-line.
  • Every lecture also contains a video session transcript with screen shots - you can print it and use it during your training.
  • Finally you will be provided with all the source codes and examples shown in the course. You can simply download the zip package from our server.


WHAT YOU WILL LEARN in this Ethical Hacking Training:

  • Module 01. Introduction and environment configuration - you will learn how to configure and prepare your system for the further training. All you need is a Windows system.
  • Module 02. Deep data hiding.
  • Module 03. Brute-force and dictionary attacks - you will get to know how an attacker could perform a brute-force or a dictionar attack on your website or web application containing a password protected data.
  • Module 04. Account lockout attack.
  • Module 05. Web parameter tampering - you will learn how to tamper hidden data used by websites. You will use the presented technique in a real-life example. Very important lesson.
  • Module 06. Path and information disclosure.
  • Module 07. Forced browsing - you will see how an attacker could "sniff" a sensitive data from a website using a forced browsing.
  • Module 08. Path traversal - you will learn a path traversal method and use it in practice in your training environment.
  • Module 09. Unicode encoding - encoding related vulnerabilities.
  • Module 10. Parameter delimiter - you will learn how to take advantage of input filtering bugs. After this lesson you will be able to create an admin account - of course without having the administrator privileges.
  • Module 11. PHP injection - you will be demonstrated a PHP code injection practical attack. Very important lesson. You will see how a malicious data can be injected into a website, e.g. using a crafted image or text string.
  • Module 12. Direct static code injection - you will learn what a ststic code injection is and how it could be used by an attacker.
  • Module 13. SQL injection - one of the TOP3 techniques used by attackers nowadays. Step by step practical demonstration. You can hack the training website yourself (without harming anybody).
  • Module 14. XSS - Cross Site Scripting attack - you will see for yourself why XSS is considered the most popular hackers' target. By the end on this lesson you will intercept a user session.
  • Module 14B. XST - Cross Site Tracing attack.
  • Module 15. XSRF - Cross Site Request Forgery attack - you will learn how an attacker can force an unaware user to reset a password.
  • Module 16. Spying on data with a browser - no additional comment needed.
  • Module 17. Session hijacking - lesson on session hijacking and consequences.
  • Module 18. Session fixation.
  • Module 19. Phishing - one of the most popular attacks. You will learn some tips to protect against it.
  • Module 20. Automated security testing - you will be taught using automated security testing tools and learn what white, black and grey box testing is. Useful knowledge for web developers and IT security consultants.


IN EACH MODULE YOU WILL ALSO SEE HOW YOU CAN PROTECT YOUR WEBSITE OR WEB APPLICATION AGAINST EVERY VULNERABILITY DESCRIBED IN THE COURSE. MODULES ARE DIVIDED INTO: 1) THEORETICAL INTRODUCTION, 2) PRACTICAL ATTACK EXAMPLE, 3) SECURITY GUIDANCE.


WHAT YOU NEED TO KNOW BEFORE YOU BEGIN:

  • This ethical hacking course is intended to help you regardless of your current knowledge and skills. All you need is a basic computer knowledge and a Windows system.
  • We will show you how to prepare your training environment. In this environment you can experiment freely, without doing harm to anybody.
  • All the modules were recorded in Windows 7 (from the attacker / victim point of view) but it doesn't mean that the presented techniques apply only to Windows. Most of them are OS independent.
  • You will download the ZIP package with all the source codes and examples from our server before you begin to avoid unnecessary code retyping.
  • Every module (lesson) contains the attack related part, as well as a guidance to protect your own website, web application or web server.


What you will find inside can also be used by beginners - thanks to live Video Training attached to the course. Almost every module covered inside has been presented by a professional web developer.


Please be advised that all the techniques presented in "Website Hacking in Practice" course can only be used ethically and in your own testing / researching environment. Note that you will get all the required tools and information to prepare your own training system. Please see the Legal information in the 1st section for further legal reference.


We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the "Website Hacking in Practice" training is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, we will give you full refund. No questions asked.

We wish you the best,
The Hacking School Team

    • basic IT knowledge
    • Basic Microsoft Windows knowledge
    • Over 45 lectures and 7.5 hours of content!
    • Lectures in PDF + Live Video Training
    • TOP 10 web app. and website related hacking techniques
    • IT security essentials
    • ZIP package with all the source codes and examples
    • 21 important techniques
    • Video sessions transcript of every module
    • web / app developers
    • system admins
    • IT sec professionals
    • everyone interested in hacking
    • ethical hackers

THE UDEMY GUARANTEE

30 day money back guarantee
Lifetime access
Available on Desktop, iOs and Android
Certificate of completion

CURRICULUM

  • SECTION 1:
    Introduction
  • 1
    Table of Contents
    9 pages
  • 2
    Legal information
    6 pages
  • SECTION 2:
    Download your training code and examples
  • 3
    Your ZIP package with source codes and examples
    Text
  • SECTION 3:
    Environment setup and training system configuration
  • 4
    Module 01. Introduction and environment configuration
    14 pages
  • 5
    Module 01. Introduction and environment configuration - Video Training
    22:37
  • SECTION 4:
    Basic techniques
  • 6
    Module 02. Deep data hiding
    6 pages
  • 7
    Module 02. Deep data hiding - Video Training
    05:00
  • 8
    Module 03. Brute-force and dictionary attacks
    15 pages
  • 9
    Module 03. Brute-force and dictionary attacks - Video Training
    14:23
  • 10
    Module 04. Account lockout attack
    8 pages
  • 11
    Module 04. Account lockout attack - Video Training
    09:05
  • SECTION 5:
    Lets get deeper - data leaks
  • 12
    Module 05. Web parameter tampering
    9 pages
  • 13
    Module 05. Web parameter tampering - Video Training
    03:38
  • 14
    Module 06. Path and information disclosure
    10 pages
  • 15
    Module 06. Path and information disclosure - Video Training
    10:51
  • 16
    Module 07. Forced browsing
    5 pages
  • 17
    Module 07. Forced browsing - Video Training
    04:38
  • 18
    Module 08. Path traversal
    9 pages
  • 19
    Module 08. Path traversal - Video Training
    07:19
  • 20
    Module 09. Unicode encoding
    3 pages
  • 21
    Module 10. Parameter delimiter
    9 pages
  • 22
    Module 10. Parameter delimiter - Video Training
    07:59
  • SECTION 6:
    Incjection attacks
  • 23
    Module 11. PHP injection
    10 pages
  • 24
    Module 11. PHP injection - Video Training
    09:21
  • 25
    Module 12. Direct static code injection
    9 pages
  • 26
    Module 12. Direct static code injection - Video Training
    08:23
  • 27
    Module 13. SQL injection
    24 pages
  • 28
    Module 13. SQL injection - Video Training
    18:39
  • SECTION 7:
    XSS related attacks
  • 29
    Module 14. XSS - Cross Site Scripting attack
    14 pages
  • 30
    Module 14. XSS - Cross Site Scripting attack - Video Training
    10:44
  • 31
    Module 14B. XST - Cross Site Tracing attack
    11 pages
  • 32
    Module 14B. XST - Cross Site Tracing attack - Video Training
    05:30
  • 33
    Module 15. XSRF - Cross Site Request Forgery attack
    14 pages
  • 34
    Module 15. XSRF - Cross Site Request Forgery attack - Video Training
    07:49
  • SECTION 8:
    More advanced techniques
  • 35
    Module 16. Spying on data with a browser
    14 pages
  • 36
    Module 16. Spying on data with a browser - Video Training
    07:27
  • 37
    Module 17. Session hijacking
    7 pages
  • 38
    Module 17. Session hijacking - Video Training
    06:07
  • 39
    Module 18. Session fixation
    9 pages
  • 40
    Module 18. Session fixation - Video Training
    04:43
  • SECTION 9:
    Phishing
  • 41
    Module 19. Phishing
    27 pages
  • 42
    Module 19. Phishing - Video Training
    07:18
  • SECTION 10:
    Security testing in practice
  • 43
    Module 20. Automated security testing
    14 pages
  • 44
    Module 20. Automated security testing - Video Training
    10:57
  • SECTION 11:
    Summary
  • 45
    Summary and references
    5 pages

UDEMY BY THE NUMBERS

5,200,000
Hours of video content
19,000,000
Course Enrollments
5,800,000
Students

RATING

  • 4
  • 4
  • 2
  • 0
  • 2
AVERAGE RATING
NUMBER OF RATINGS
12

REVIEWS

  • Oheneba Kwame Appiah-Kubi
    Well Recommended.

    MSc in Information and Communication Systems Security. Great course. Highly recommended for all aspiring to be web developers or security specialists.

  • Nasar Syed
    recommended for new larners ..

    pure basic course for newbie learners. much recommended

  • Zagros Bingöl
    very easy

    good that you contribute to beginners, i have had experience in 5 years of secuirty research just needed this to add to my cv hehe

  • Jason Carrier
    WebSite hacking in Practice

    This course is good, it was a bit slow at first, but it picked up. I wish they had online labs. I have Web Goat, and Samurai WTF but it would be nice to practice on live environment.

  • Mr. Kalob Taulien
    Amazing!

    If you're wondering if you should buy this course.. the answer is yes! Every web developer can learn this practice, called ethical hacking, and it will further your knowledge about security in general.