Website Hacking in Practice: Hands-on Course 101

Explore ethical hacking with our comprehensive training course covering critical web vulnerabilities and real-life hacking techniques for programmers and web administrators.

  • Overview
  • Curriculum
  • Instructor
  • Review

Brief Summary

This course takes you on a hands-on journey into ethical hacking, teaching you how to protect your website by understanding common hacking techniques. It's great for anyone from beginners to seasoned pros in web security.

Key Points

  • Step-by-step training on website and web-application ethical hacking.
  • Covers OWASP's Top 10 Most Critical Web Application Attacks.
  • Designed for beginners to pros—anyone interested in web security.
  • Includes practical examples, PDF lectures, and live video sessions.
  • Learn 21 hacking techniques with real-life application.

Learning Outcomes

  • Understand and apply the Top 10 web application attacks.
  • Conduct hands-on hacking exercises ethically in a controlled environment.
  • Learn how to secure websites against various vulnerabilities.
  • Gain insight into automated security testing tools.
  • Build practical skills in preventing common hacking techniques.

About This Course

This Ethical Hacking training is dedicated to programmers and website administrators. Website security unleashed.

LAST UPDATED: 11/2024

Ethical Hacking Course: Website Hacking in Practice Training course - finally published!

Welcome to Hacking School: Website Hacking in Practice Training!  

Before we begin – the practical use of the training you are going to see has been proven by vast group of people – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, black- and white hat hackers. Please, read carefully what we'd like to share with you. 

The course covers all important hacking techniques used by hackers and system administrators. About the Ethical Hacking Training course (what you can expect): 

  • It is a step by step training on Website and Web-application ethical hacking and security.

  • It covers almost all of the Top 10 Most Critical Web Application Attacks presented yearly by OWASP organization (Open Web Application Security Project) + 10 common techniques / vulnerabilities more.

  • It can be treated as a valuable source of knowledge for any white hat hacker, web developer, system administrator or IT security consultant.

  • You will learn how to hack using 21 interesting techniques and see how each of them can be used in a practical real-life example.

  • You will get access to all the lectures in PDF format and live Ethical Hacking Video Training sessions you can watch on-line.

  • Every lecture also contains a video session transcript with screen shots - you can print it and use it during your training.

  • Finally you will be provided with all the source codes and examples shown in the course. You can simply download the zip package from our server.

 
WHAT YOU WILL LEARN in this Ethical Hacking Training:
 

  • Module 01. Introduction and environment configuration - you will learn how to configure and prepare your system for the further training. All you need is a Windows system.

  • Module 02. Deep data hiding.

  • Module 03. Brute-force and dictionary attacks - you will get to know how an attacker could perform a brute-force or a dictionar attack on your website or web application containing a password protected data.

  • Module 04. Account lockout attack.

  • Module 05. Web parameter tampering - you will learn how to tamper hidden data used by websites. You will use the presented technique in a real-life example. Very important lesson.

  • Module 06. Path and information disclosure.

  • Module 07. Forced browsing - you will see how an attacker could "sniff" a sensitive data from a website using a forced browsing.

  • Module 08. Path traversal - you will learn a path traversal method and use it in practice in your training environment.

  • Module 09. Unicode encoding - encoding related vulnerabilities.

  • Module 10. Parameter delimiter - you will learn how to take advantage of input filtering bugs. After this lesson you will be able to create an admin account - of course without having the administrator privileges.

  • Module 11. PHP injection - you will be demonstrated a PHP code injection practical attack. Very important lesson. You will see how a malicious data can be injected into a website, e.g. using a crafted image or text string.

  • Module 12. Direct static code injection - you will learn what a ststic code injection is and how it could be used by an attacker.

  • Module 13. SQL injection - one of the TOP3 techniques used by attackers nowadays. Step by step practical demonstration. You can hack the training website yourself (without harming anybody).

  • Module 14. XSS - Cross Site Scripting attack - you will see for yourself why XSS is considered the most popular hackers' target. By the end on this lesson you will intercept a user session.

  • Module 14B. XST - Cross Site Tracing attack.

  • Module 15. XSRF - Cross Site Request Forgery attack - you will learn how an attacker can force an unaware user to reset a password.

  • Module 16. Spying on data with a browser - no additional comment needed.

  • Module 17. Session hijacking - lesson on session hijacking and consequences.

  • Module 18. Session fixation.

  • Module 19. Phishing - one of the most popular attacks. You will learn some tips to protect against it.

  • Module 20. Automated security testing - you will be taught using automated security testing tools and learn what white, black and grey box testing is. Useful knowledge for web developers and IT security consultants.

 
IN EACH MODULE YOU WILL ALSO SEE HOW YOU CAN PROTECT YOUR WEBSITE OR WEB APPLICATION AGAINST EVERY VULNERABILITY DESCRIBED IN THE COURSE. MODULES ARE DIVIDED INTO: 1) THEORETICAL INTRODUCTION, 2) PRACTICAL ATTACK EXAMPLE, 3) SECURITY GUIDANCE.
 

 
WHAT YOU NEED TO KNOW BEFORE YOU BEGIN:
 

  • This ethical hacking course is intended to help you regardless of your current knowledge and skills. All you need is a basic computer knowledge and a Windows system.

  • We will show you how to prepare your training environment. In this environment you can experiment freely, without doing harm to anybody.

  • All the modules were recorded in Windows 7 (from the attacker / victim point of view) but it doesn't mean that the presented techniques apply only to Windows. Most of them are OS independent.

  • You will download the ZIP package with all the source codes and examples from our server before you begin to avoid unnecessary code retyping.

  • Every module (lesson) contains the attack related part, as well as a guidance to protect your own website, web application or web server.

 
What you will find inside can also be used by beginners
- thanks to live Video Training attached to the course. Almost every module covered inside has been presented by a professional web developer. 

 
Please be advised that all the techniques presented in "Website Hacking in Practice" course can only be used ethically and in your own testing / researching environment.
Note that you will get all the required tools and information to prepare your own training system. Please see the Legal information in the 1st section for further legal reference. 

 
We guarantee your 100% satisfaction or you will get your money back.
You have 30 days to decide if this course is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, we will give you full refund. No questions asked. 


We wish you the best,
The Hacking School Team 

  • Lectures in PDF + Live Video Training

  • TOP 10 web app. and website related hacking techniques

  • IT security essentials

Course Curriculum

1 Lectures

1 Lectures

Instructors

Profile photo of Hacking School
Hacking School

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results. We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become...

Instructors

Profile photo of IT Security Academy
IT Security Academy

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Review
4.9 course rating
4K ratings
ui-avatar of Jennifer Strong
Jennifer S.
1.0
3 years ago

I can not download any pdf files. How old is this course - I thought it was updated.

  • Helpful
  • Not helpful
ui-avatar of Ben S
Ben S.
3.0
3 years ago

Some contents is out of date from 2013 or so. Some parts lack depth.

Good overall for ~8 hour content.

  • Helpful
  • Not helpful
ui-avatar of Dan Ruiz
Dan R.
2.5
4 years ago

the content is very old and needs to be updated, many examples and php scripts, not even running, which hinders the execution of the practical part.

  • Helpful
  • Not helpful
ui-avatar of Ewelina
Ewelina
5.0
4 years ago

I recommend this cours. Everyone should know the vulnerabilities presented in this training.

  • Helpful
  • Not helpful
ui-avatar of Sławek
Sławek
5.0
4 years ago

Good course - very nicely explained.

  • Helpful
  • Not helpful
ui-avatar of Jorge Rochez
Jorge R.
4.0
5 years ago

Great !!!

  • Helpful
  • Not helpful
ui-avatar of Mario A. Fernandes
Mario A. F.
3.5
5 years ago

Gave me a pretty good understanding of the different tools used and how to secure your code from vulnerabilities

  • Helpful
  • Not helpful
ui-avatar of Chris L Selby
Chris L. S.
5.0
5 years ago

Even though the material in this course is quite dated, I found it very valuable considering that I deal with PHP code and it helped me to understand why some of the new implementations of the PHP language work as far as better security of code and how it could have been broken in the past.

  • Helpful
  • Not helpful
ui-avatar of RayCamrass
Raycamrass
3.5
5 years ago

I am trying to find out what techniques are used by ransomware attacks

  • Helpful
  • Not helpful
ui-avatar of John Mesure
John M.
5.0
5 years ago

Gentle and easy to get to learn. Great course. The deliver is clear, progressive and absorbing.

  • Helpful
  • Not helpful
Leave A Reply

Your email address will not be published. Required fields are marked *

Ratings

Courses You May Like

Lorem ipsum dolor sit amet elit
Show More Courses