Pentesting with Daniel Slater (Ethical Hacking/Web Security)

Join 170,000+ students - Learn cyber security, penetration testing (pentesting) and ethical hacking

Ratings: 4.15 / 5.00




Description

Computer security is one of the biggest job gaps in history, with a shortage of 3.5 million skilled workers needing to tackle a problem estimated to be worth $6 trillion. This is one of the biggest opportunities in history.

When you complete this course you'll have the knowledge to get a job and cash in on the $6 trillion industry!

Although this course covers practical methods for breaking into and securing systems, most of the lectures focus on principals which allow you to properly understand the concepts. This differs from a lot of courses on Udemy that teach specific tools that will be out of date next year. This course is designed to teach the next thought leaders of the industry... ones who are capable of making tools that make everything before it seem outdated!

This course covers all the topics of several of my courses at university. It's not long, it's light hearted, and doesn't feel dense... but all the content is there.

This course includes lectures on:

  • Core Security Principals

  • Injection

    • SQL Injection

    • XML Injection

    • JSON Injection

    • Cross Site Scripting (XSS)

  • Phishing

  • Brute Force

  • Security Mindset

  • Client Side and Server Side Attacks

  • Authentication and Access Control

  • Cryptography

    • Encryption

    • Hashing

  • Cross Site Request Forgery (CSRF)

  • DDoS

  • Password

  • Deployment Best Practices

  • External Packages

  • Monitoring and Response

  • Honeypots

  • OWASP Top 10

And two assignments that will test your patience and show you what real hacking is like!

What You Will Learn!

  • Website hacking
  • Penetration testing
  • How to find vulnerabilities
  • How to secure vulnerabilities
  • How to exploit vulnerabilities
  • Computer security fundamentals
  • How to secure and exploit the OWASP Top 10
  • Cyber security
  • Ethical Hacking
  • How to identify bug bounties
  • Black hat hacker/red team techniques
  • SQL injection
  • Cross site scripting (XSS)
  • Web application security

Who Should Attend!

  • University students studying computer science or a related field
  • Tinkerers wanting to ensure their apps are secure
  • Employees wanting to improve the cyber security of their firm
  • Developers interested in learning security
  • Security professionals wanting to refresh their knowledge