Pentesting and Securing Web Applications (Ethical Hacking)

Join 140,000+ students in learning cyber security, pentesting and ethical hacking! Learn everything you need today!

What you will learn

How to find vulnerabilities

How to secure vulnerabilities

How to exploit vulnerabilities

Computer security fundamentals

How to secure and exploit the OWASP Top 10

How to identify bug bounties

Black hat hacker/red team techniques

Cross site scripting (XSS)

Web application security


Computer security is one of the biggest job gaps in history, with a shortage of 3.5 million skilled workers needing to tackle a problem estimated to be worth $6 trillion. This is one of the biggest opportunities in history.

When I was at university I did a lot of security courses and to be honest I was pretty frustrated at how they were taught. The concepts and their importance captured my imagination but I knew it could be taught in a better way… so I created a few YouTube videos on the topic. They were very well received… So well received that after a few years working in industry I decided to make this course.

Although this course covers practical methods for breaking into and securing systems, most of the lectures focus on principals which allow you to properly understand the concepts. This differs from a lot of courses on Udemy that teach specific tools that will be out of date next year. This course is designed to teach the next thought leaders of the industry… ones who are capable of making tools that make everything before it seem outdated.

This course covers all the topics of several of my courses at university. It’s not long, it’s light hearted, and doesn’t feel dense… but all the content is there.





Be Ethical. Never Hack.

Never Hack

Injection Intro

SQL Injection

XML Injection

Library Bloat

Cross Site Scripting (XSS)

Injection Defense

Do I need to worry about injection here?

Core Knowledge

Common Terms


Ethics & Legality


Attack Surface

0 days

Brute Force


Core Knowledge Quiz

Security Mindset

Security Mindset

Client Side and Server Side

Client and Server Side

Client and Server Side Quiz

Authentication and Access Control

Authentication and Access Control

Authentication and Access Control Quiz


What is a Cryptographic Hash?

How is Hashing Useful?

Hash Attacks

Cryptographic Hash Defense


Cryptography Quiz

Cross Site Request Forgery

Cross Site Request Forgery



DDoS – Distributed Denial of Service



Deployment Quiz

External Packages

External Packages

Implement or Import?

External Packages Quiz

Monitoring and Response

Shocking Figures

Identifying an Attack


Breach Response and Defense

Monitoring and Response Quiz


OWASP Top 10


Source link

Check Today's 30+ Free Courses on Telegram!

Ads Blocker Image Powered by Code Help Pro

Ads Blocker Detected!!!

We have detected that you are using extensions to block ads. Please support us by disabling these ads blocker.

Powered By
Best Wordpress Adblock Detecting Plugin | CHP Adblock