Learn Step by Step Web Hacking and Penetration Testing

Learn ethical hacking techniques and methodologies through practical training and labs. Master penetration testing to secure web applications and protect against vulnerabilities.

  • Overview
  • Curriculum
  • Instructor
  • Review

Brief Summary

This course guides you from being a total beginner in ethical hacking to a confident tester. You'll learn to use hacking tools and techniques, understand web security, and apply practical skills in real lab environments. It's all about mastering security while having fun!

Key Points

  • Learn hacking tools and techniques
  • Think like a hacker to protect against them
  • Practical labs based on real-life situations
  • Start from zero knowledge about penetration testing
  • Focus on both theory and practical skills

Learning Outcomes

  • Understand and perform basic penetration testing steps
  • Identify and exploit web application vulnerabilities
  • Gather information on your targets securely
  • Set up a testing lab with necessary tools
  • Understand the OWASP Top Ten vulnerabilities

About This Course

You will learn hacking tools, methodologies and techniques and and learn how to secure them from these hackers.

In order to protect yourself from hackers, you must think as one.

This training is based on a practical approach of day-by-day situations and it contain labs based on real environments.


In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking.

This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine.

The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.

Once you understand how websites work we will start talking about how can we exploit these components. This course will take you from a beginner to a more advanced level -- so you will be able to launch attacks and test the security of websites and web applications, and furthermore  you'll be able to help fixing these vulnerabilities and secure websites from them.

Below are the main topics, both theoretical and practical, of this course:

  • Core problems (Causes. Defences)

  • Web Technologies (HTTP Protocol, Web Functionality, Encoding)

  • Mapping (Spidering and Analysing)

  • Attacking Authentication (Technologies, Flaws, Fixes, Brute Force)

  • Attacking Session Management (State, Tokens, Flaws)

  • Attacking Access Controls (Common Vulnerabilities, Attacks)

  • Attacking Data Stores (SQL Injection, Bypassing Filters, Escalation)

  • Bypassing Client-Side Controls (Browser Interception, HTML interception, Fixes)

  • Attacking the server (OS command Injection, Path Traversal, Mail Injection, File Upload)

  • Attacking Application Logic

  • Cross Site Scripting

  • Attacking Users (CSRF, ClickJacking, HTML Injection)

  • OWASP Top Ten Vulnerabilities

  • Network Attacks

Labs:

  • Spidering, Website Analyser

  • Brute-Force

  • Session Hijacking via Mann-in-The-Middle

  • Get Gmail or Facebook Passwords via SSLStrip

  • SQL Injection

  • Upload File and Remote Execution

  • Cross-Site Scripting (Stored + Reflected, Cookie Stealing, Preventing XSS)

  • CSRF (Change password trough CSRF vuln., Preventing CSRF)


NOTE: This course is created only for educational purposes  and all the attacks are launched in  an isolated lab environment.

  • Understand and perform the basic steps in order to performa penetration testing of a web application

  • Understand web application's security principles and potential dangers

  • Be able to gather information about your target

Course Curriculum

2 Lectures

2 Lectures

Instructor

Profile photo of Gabriel Avramescu
Gabriel Avramescu

Senior Information Security Consultant- I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary.- Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical...

Review
4.9 course rating
4K ratings
ui-avatar of Pratap Anem
Pratap A.
5.0
9 months ago

Good

  • Helpful
  • Not helpful
ui-avatar of MARIANA ZAVALA
Mariana Z.
5.0
9 months ago

OK

  • Helpful
  • Not helpful
ui-avatar of aboobakker siddhique
Aboobakker S.
5.0
10 months ago

nicw

  • Helpful
  • Not helpful
ui-avatar of Michelle Bernaix
Michelle B.
5.0
11 months ago

Easier to understand than I thought!

  • Helpful
  • Not helpful
ui-avatar of Rakibul Islam
Rakibul I.
5.0
11 months ago

Yes, that is exactly what I expected, but I think you should provide us with an online lab that we may attempt to solve with this course. That's what this course really accomplished.

  • Helpful
  • Not helpful
ui-avatar of Kolbugri Razak
Kolbugri R.
5.0
11 months ago

Fantastic course. The teacher was thorough and gave a detailed explanation. I enjoyed the handouts he used to illustrate penetration ideas. Practical activities exemplified the application of various tools and reinforced concepts.

  • Helpful
  • Not helpful
ui-avatar of Preeti Jha
Preeti J.
5.0
11 months ago

Extremely comprehensive and elucidated. Had a great time processing this fascinating information. It's astonishing how quickly Gabriel and his friendly teaching helpers respond if you get stuck.

  • Helpful
  • Not helpful
ui-avatar of Nk Bloggers
Nk B.
5.0
11 months ago

The teacher is competent and well-versed in his subject. Excellent illustrations on how to launch an attack. The best part is that, in addition to demonstrating how to get around the weaknesses, he also demonstrates how to mitigate them.

  • Helpful
  • Not helpful
ui-avatar of Reshma Ramdien-Kalisingh
Reshma R.
5.0
11 months ago

It seemed like solid content to me. I believe that if there was an explanation when using Java, it would be even better. I'm excited about what lies ahead.

  • Helpful
  • Not helpful
ui-avatar of Fernando Lopes Morais Savana
Fernando L. M. S.
5.0
11 months ago

Amazing course.This is great startup course for who all are starting their journey in hacking. Thank you Gabriel for the clear explanation!

  • Helpful
  • Not helpful
Leave A Reply

Your email address will not be published. Required fields are marked *

Ratings

Courses You May Like

Lorem ipsum dolor sit amet elit
Show More Courses