Advanced Ethical Hacking and Web Application Pentesting | WeGeek

Advanced Ethical Hacking and Web Application Pentesting

Learn how to do ethical hacking, penetration testing, web testing, and wifi hacking using kali linux!

 

What you’ll learn?

 

  • Learn Ethical Hacking from PRO and become a certified hacker, a Perfect practical guide for beginners & professionals.
  • Learn Hacking Mobile Phone
  • You will learn how to Hack Networks and Routers
  • You will learn how to Hack Networks and Routers
  • (496 Reviews)

Curiculum

Introduction to the course

Get your course goals

Instructors

Admin bar avatar
HQ Traing

Developer

He has a Master of Science in Network Systems and a Bachelor of Science in Software Engineering. He is also a Microsoft Certified Application Developer, Technology Specialist (Web Applications) and Professional. Outside the software world, he is a photographer, a pianist and a passionate Latin dancer.
User Rating

4.1 average based on 254 reviews.


5 star
150
4 star
63
3 star
15
2 star
6
1 star
20

Benefits

Industry-Recognized Certification

After completion of each course, you will be entitled with valid certification that will recognize your efforts of particular field. Share your achievement with your friends, family and organization for your career growth.

certificate.1

Description

In this course you will learn pentesting and how to discover critical facts that enables You to hack into computer / applications, later tool, strategies and technologies that help you to penetrate (hack) into your goal- Ethical Hackers have high demand and feature wonderful job scope around the sector.
 
Ethical Hacking (EH) and Web Application Penetration Testing (WAPT) Course is IT Security (Offensive) Security Course teaches you a way to discover vulnerabilities (bugs or loopholes, like coding mistakes, configuration mistakes or errors etc.) in any applications and Network infrastructures including networking devices, mobiles etc- Web Application Penetration is specific to digging the same specific to web applications.
 
This Ethical Hacking course is highly comprehensive made of 145 video lectures of 31 hours and PDF & text materials.
 

Target Audience:

 
Law Enforcement personnel
Security Auditors
PHP, .NET, Java Developers, Netwoking Professionals, Firewall/IDS Specialists
Law Firm Agents
Cyber Crime Investigators
Security Analysts
Anyone with basic Computer knowledge

Class Curriculum

    Computer Basics & Introduction

  • Course Introduction - Ethical Hacking (30:58)
  • Course Introduction -Web Application Penetration Testing (23:50)
  • Ethical Hacking Overview (44:35)
  • Hands on Windows Commands (20:53)
  • Linux Basics (19:48)
  • Networking (6:55)
  • Internet Governance (7:03)
  • Testing your Basic Skills

    Setting your Lab

  • Lab Setup (12:52)
  • Windows Server Installation (25:07)
  • Ubuntu Installation (11:44)
  • Backtrack OS Installation (11:15)
  • Installing Backtrack Tools on Ubuntu (9:18)
  • XAMPP Installation (10:05)
  • Ethical Hacking (Basics to Advance)- Information Gathering

  • Reconnaissance (26:16)
  • Google Hacking -Video1 (18:26)
  • Google Hacking -Video2 (1:16)
  • Scanning and Enumeration - Video1 (25:42)
  • Scanning and Enumeration - Video2 - APS (4:48)
  • Scanning and Enumeration - Video3 - Nmap Tutorials (9:20)
  • Scanning and Enumeration - Video4 - LBD (2:06)
  • Scanning and Enumeration - Video5 (2:52)
  • Scanning and Enumeration - Video6 (6:43)
  • Ethical Hacking Basics Quiz

    Ethical Hacking(Basics to Advance) - System Hacking

  • System Hacking Video1 (12:08)
  • System Hacking Video2 (8:45)
  • System Hacking Video3 (8:36)
  • System Hacking Video4 (5:06)
  • System Hacking Video5 (2:19)
  • Proxy Servers (27:30)
  • Proxy Servers - EPS Tutorial (6:14)
  • Proxy Servers - TOR Proxy (3:40)
  • Keyloggers (5:18)
  • Trojans (20:25)
  • Virus (17:42)
  • Social Engineering (15:41)
  • Email Hacking (21:44)
  • Sniffing - Video1 (9:25)
  • Sniffing - Video2 - Wireshark Tutorials (19:24)
  • Sniffing - Video3 - Cain n Able (8:30)
  • Session Hijacking - Video1 (8:08)
  • Session Hijacking - Video2 (5:16)
  • Session Hijacking - Video3 (2:42)
  • Ethical Hacking (Basics to Advance)- Web Server(Site) Hacking

  • Web Server Hacking (28:05)
  • SQL Injection -Video1 (6:59)
  • SQL Injection -Video2 (25:05)
  • SQL Injections -Practical Demonstrations (20:09)
  • Cross-site Scripting (XSS)- Video1 (11:20)
  • Cross-site Scripting (XSS)- Video2 (7:11)
  • Cross-site Scripting (XSS)- Video3 (2:15)
  • Remote File Inclusion Attacks (5:46)
  • Buffer Overflows and Exploit Writing (37:12)
  • Reverse Engineering (34:45)
  • Cryptography (24:45)
  • Firewalls (28:51)
  • Denial Of Service (DOS) Attacks - Video1 (10:20)
  • Denial Of Service (DOS) Attacks - Video2 (7:17)
  • Physical Security (8:20)
  • Hacking Wireless Netrworks (11:08)
  • Metasploit Framework - Video1 (20:54)
  • Metasploit Framework - Video2 (8:19)
  • Penetration Testing - Video1 (4:46)
  • Penetration Testing - Video2 (10:55)
  • Penetration Testing - Video3 (5:29)
  • Router Hacking (26:32)
  • Hacking Mobile Phones (34:37)
  • Web Application Penetration Testing-Video1 (11:49)
  • Web Application Penetration Testing-Video2 (2:39)
  • Web Application Penetration Testing-Video3 (2:48)
  • Web Application Penetration Testing-Video4 (8:17)
  • Web Application Penetration Testing-Video5 (1:55)
  • Web Application Penetration Testing-Video6 (2:10)
  • Web Application Penetration Testing - ADVANCE (PART 2 Of this Course)

  • Introduction to Web Applications - Video1 (12:45)
  • Introduction to Web Applications - Video2 (7:52)
  • Client Server Architecture (15:13)
  • Working with Protocols -Video1 (24:27)
  • Working with Protocols -Video2 (12:46)
  • Web Application Technologies -Video1 (17:07)
  • Web Application Technologies -Video2 (12:27)
  • Protocol Status Codes -Video1 (15:09)
  • Protocol Status Codes -Video2 (7:30)
  • Web Server and Client -Video1 (11:36)
  • Web Server and Client -Video2 (5:26)
  • Web Server and Client -Video3 (13:40)
  • WEB SERVER AND CLIENT- Video4 (6:13)
  • Necessity of Web Application Security (17:26)
  • Offensive and Defensive Mechanisms (15:17)
  • OWASP TOP 10

  • OWASP -Video1 (3:55)
  • OWASP -Video2 (29:10)
  • OWASP-SQL Injections (20:45)
  • OWASP-Crosssite Scripting Attacks (XSS) (9:16)
  • OWASP-Broken Authentication Mechanisms (4:07)
  • OWASP-Indirect Object References (4:38)
  • OWASP-Cross-site Request Forgery (CSRF) (9:18)
  • OWASP -- Security Misconfigurations - Video8 (2:01)
  • OWASP - Failure to Restrict URL Access, Unvalidated Redirects & Objects (8:37)
  • Web Application Penetration Testing - ADVANCE (PART 2 Of this Course)

  • Mastering Web Dojo - Video1 (2:16)
  • Mastering Web Dojo - Video2 (39:17)
  • Code Defence Mechanisms (11:47)
  • Mapping the Web Applications-Video1 (7:27)
  • Mapping the Web Applications-Video2 (5:26)
  • Mapping the Web Applications-Video3 (7:50)
  • Bypassing the Client-Side Controls -Video1 (9:27)
  • Bypassing the Client-Side Controls -Video2 (29:26)
  • Bypassing the Client-Side Controls -Video3 (11:22)
  • Bypassing the Client-Side Controls -Video4 (6:19)
  • Bypassing the Client-Side Controls -Video5 (12:09)
  • Bypassing the Client-Side Controls -Video6 (14:49)
  • Attacking Authentications -Video1 (18:21)
  • Attacking Authentications -Video2 (9:54)
  • Attacking Authentications -Video3 (4:41)
  • Attacking Session Management -Video1 (25:09)
  • Attacking Session Management -Video2 (8:03)
  • Attacking Session Management -Video3 (3:04)
  • Attacking Session Management -Video4 (7:42)
  • Attacking Session Management -Video5 (6:04)
  • Attacking Access Controls -Video1 (20:03)
  • Attacking Access Controls -Video2 (7:56)
  • Attacking Data Stores -Video1 (19:54)
  • Attacking Data Stores -Video2 (8:15)
  • Attacking Data Stores -Video3 (8:24)
  • Attacking Data Stores -Video4 (18:33)
  • Attacking Data Stores -Video5 (23:59)
  • Attacking Data Stores -Video6 (6:00)
  • Attacking Data Stores -Video7 (3:00)
  • Attacking BackEnd Components -Video1 (28:33)
  • Attacking BackEnd Components -Video2 (1:59)
  • Attacking BackEnd Components -Video3 (1:59)
  • Attacking BackEnd Components -Video3 (12:23)
  • Attacking BackEnd Components -Video4 (2:55)
  • Attacking BackEnd Components -Video5 (3:19)
  • Attacking Application Logic -Video1 (1:26)
  • Attacking Application Logic- Video2 (7:39)
  • Attacking Users -Video1 (40:54)
  • Attacking Users -Video2 (40:28)
  • Attacking Users (Other Techniques)- Video1 (25:06)
  • Attacking Users (Other Techniques)- Video2 (3:27)
  • Attacking Users (Other Techniques)- Video3 (2:45)
  • Automated Customised Attacks -Video1 (23:19)
  • Automated Customised Attacks -Video2 (4:21)
  • Automated Customised Attacks -Video3 (17:21)
  • Exploiting Information Disclosure -Video1 (28:58)
  • Exploiting Information Disclosure -Video2 (10:54)
  • Attacking Native Compiled Applications (13:43)
  • Attacking Application Architecture-Video1 (15:31)
  • Attacking Application Architecture-Video2 (6:26)
  • Attacking Application Server -Video1 (15:58)
  • Attacking Application Server -Video2 (10:05)
  • Finding Vulnerabilities in Source Code (21:52)
  • Web Application Penetration Testing

  • Ethical Hackers Reporting and Methodology (20:43)
User Rating

4.7 average based on 261 reviews.


5 star
150
4 star
63
3 star
15
2 star
6
1 star
20

Student Reviews

Dont Miss Out Offer Ends In

  • Days
  • Hours
  • Minutes
  • Seconds
$12

Course Features

  • 30-Day Money-Back Guarantee
  • Lessons With Examples
  • 8 Hours of Learning
  • Lifetime 24/7 Access
  • Completion Certificate
× Shopping Cart

Your cart is empty.