HOME > IT & Software > Pentesting with Daniel Slater (Ethical HackingWeb Security)

Pentesting with Daniel Slater (Ethical HackingWeb Security)

SynopsisPentesting with Daniel Slater (Ethical Hacking/Web Security ,...
Pentesting with Daniel Slater (Ethical HackingWeb Security)  No.1

Pentesting with Daniel Slater (Ethical Hacking/Web Security), available at $49.99, has an average rating of 3.65, with 35 lectures, 10 quizzes, based on 1729 reviews, and has 173087 subscribers.

You will learn about Website hacking Penetration testing How to find vulnerabilities How to secure vulnerabilities How to exploit vulnerabilities Computer security fundamentals How to secure and exploit the OWASP Top 10 Cyber security Ethical Hacking How to identify bug bounties Black hat hacker/red team techniques SQL injection Cross site scripting (XSS) Web application security This course is ideal for individuals who are University students studying computer science or a related field or Tinkerers wanting to ensure their apps are secure or Employees wanting to improve the cyber security of their firm or Developers interested in learning security or Security professionals wanting to refresh their knowledge It is particularly useful for University students studying computer science or a related field or Tinkerers wanting to ensure their apps are secure or Employees wanting to improve the cyber security of their firm or Developers interested in learning security or Security professionals wanting to refresh their knowledge.

Enroll now: Pentesting with Daniel Slater (Ethical Hacking/Web Security)

Summary

Title: Pentesting with Daniel Slater (Ethical Hacking/Web Security)

Price: $49.99

Average Rating: 3.65

Number of Lectures: 35

Number of Quizzes: 10

Number of Published Lectures: 35

Number of Published Quizzes: 10

Number of Curriculum Items: 47

Number of Published Curriculum Objects: 47

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Website hacking
  • Penetration testing
  • How to find vulnerabilities
  • How to secure vulnerabilities
  • How to exploit vulnerabilities
  • Computer security fundamentals
  • How to secure and exploit the OWASP Top 10
  • Cyber security
  • Ethical Hacking
  • How to identify bug bounties
  • Black hat hacker/red team techniques
  • SQL injection
  • Cross site scripting (XSS)
  • Web application security
  • Who Should Attend

  • University students studying computer science or a related field
  • Tinkerers wanting to ensure their apps are secure
  • Employees wanting to improve the cyber security of their firm
  • Developers interested in learning security
  • Security professionals wanting to refresh their knowledge
  • Target Audiences

  • University students studying computer science or a related field
  • Tinkerers wanting to ensure their apps are secure
  • Employees wanting to improve the cyber security of their firm
  • Developers interested in learning security
  • Security professionals wanting to refresh their knowledge
  • Computer security is one of the biggest job gaps in history, with a shortage of 3.5 million skilled workers needing to tackle a problem estimated to be worth $6 trillion. This is one of the biggest opportunities in history.

    When you complete this course you’ll have the knowledge to get a job and cash in on the $6 trillion industry!

    Although this course covers practical methods for breaking into and securing systems, most of the lectures focus on principals which allow you to properly understand the concepts. This differs from a lot of courses on Udemy that teach specific tools that will be out of date next year. This course is designed to teach the next thought leaders of the industry ones who are capable of making tools that make everything before it seem outdated!

    This course covers all the topics of several of my courses at university. It’s not long, it’s light hearted, and doesn’t feel dense but all the content is there.

    This course includes lectures on:

  • Core Security Principals

  • Injection

  • SQL Injection

  • XML Injection

  • JSON Injection

  • Cross Site Scripting (XSS)

  • Phishing

  • Brute Force

  • Security Mindset

  • Client Side and Server Side Attacks

  • Authentication and Access Control

  • Cryptography

  • Encryption

  • Hashing

  • Cross Site Request Forgery (CSRF)

  • DDoS

  • Password

  • Deployment Best Practices

  • External Packages

  • Monitoring and Response

  • Honeypots

  • OWASP Top 10

  • And two assignments that will test your patience and show you what real hacking is like!

    Course Curriculum

    Chapter 1: Injection

    Lecture 1: Be Ethical. Never Hack.

    Lecture 2: Injection Intro

    Lecture 3: SQL Injection

    Lecture 4: XML Injection

    Lecture 5: Library Bloat

    Lecture 6: Cross Site Scripting (XSS)

    Lecture 7: Injection Defense

    Chapter 2: Core Knowledge

    Lecture 1: Common Terms

    Lecture 2: Phishing

    Lecture 3: Ethics & Legality

    Lecture 4: Basics

    Lecture 5: Attack Surface

    Lecture 6: 0 days

    Lecture 7: Brute Force

    Lecture 8: Misconceptions

    Chapter 3: Security Mindset

    Lecture 1: Security Mindset

    Chapter 4: Client Side and Server Side

    Lecture 1: Client and Server Side

    Chapter 5: Authentication and Access Control

    Lecture 1: Authentication and Access Control

    Chapter 6: Cryptography

    Lecture 1: What is a Cryptographic Hash?

    Lecture 2: How is Hashing Useful?

    Lecture 3: Hash Attacks

    Lecture 4: Cryptographic Hash Defense

    Lecture 5: Encryption

    Chapter 7: Cross Site Request Forgery

    Lecture 1: Cross Site Request Forgery

    Chapter 8: Deployment

    Lecture 1: DDoS – Distributed Denial of Service

    Lecture 2: Configuration

    Lecture 3: Passwords

    Chapter 9: External Packages

    Lecture 1: External Packages

    Lecture 2: Implement or Import?

    Chapter 10: Monitoring and Response

    Lecture 1: Shocking Figures

    Lecture 2: Identifying an Attack

    Lecture 3: Honeypots

    Lecture 4: Breach Response and Defense

    Chapter 11: Conclusion

    Lecture 1: OWASP Top 10

    Lecture 2: Conclusion

    Instructors

  • Pentesting with Daniel Slater (Ethical HackingWeb Security)  No.2
    Daniel Slater
    Over 170,000 students – Computer Security Expert – Engineer
  • Rating Distribution

  • 1 stars: 71 votes
  • 2 stars: 83 votes
  • 3 stars: 306 votes
  • 4 stars: 512 votes
  • 5 stars: 757 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!