riversongs Posted Wednesday at 10:04 PM Report Share Posted Wednesday at 10:04 PM Free Download Udemy - Web Application Penetration Testing And Bug Bounty CourseLast updated 1/2017MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 1.08 GB | Duration: 5h 55mComplete Ethical hacking and penetration testing guide to make sure that your web application is secureWhat you'll learnyou will be able to apply for Jr. PentesterIntermediate Bug Bounty hunterFind and report critical bugsPrepare Proof of Concepts for bugsAutomate vulnerability searchesLearn about web goat, hackme casino and KaliRequirementsUse computers at basic levelBasic understanding of working of websitesWindows and MAC, both are good for this courseDescriptionWelcome to Web application penetration testing and bug bounty course. A course that teaches you practically, about web application security, protecting your websites from attacks and reporting bugs for reward money, if you found one.Every single day, you read this in news, linkedin was attacked, Yahoo was attacked and have asked users to change their passwords. Cyber security is next Big thing. Every month thousands of people are learning about web app development and yet only a few are learning to secure those applicationsWe have designed this course, so that you can learn to secure web application. Regardless that you know, How to design one or not, these skills will help you to run various tests and enhance security of web apps. By the end of this course, you will able to apply for Junior web application pen tester, A complete independent bug bounty hunter and secure web developer.In this course we will learn to install our own labs to do pentesting. We will walk you through with OWASP, top vulnerabilities like sql injection, Cross site scripting, session management flaws and various others. Also we will give you enough challenges to practice along.Ideal student for this course is one who is interested in Web application security, Bug bounty and developers who want to secure their web apps.Our goal with this course is to create more security experts so that these incidents can be minimised. It used to be time when banks were attacked, now everything is online and so is the money and attackers. Every web application developers should have skills to secure web application. In fact, development should be a process with constant involvement of cyber security experts.Join us in this goal of creating secure cyber space. This course is great starting point to earn some good bounties with bugs. Take a look at some free previews and See You Inside Course.OverviewSection 1: Getting started in Web Application pentestingLecture 1 Introduction to the courseLecture 2 Setting realistic goals with courseLecture 3 Getting ready with tools, softwares and hardwareLecture 4 How to earn with bug bounty - FAQSection 2: Clearing up our Vocab of web application pentestingLecture 5 what to expect in section 2Lecture 6 Installing DOJO for pentestingLecture 7 Installing KALI for penetration testingLecture 8 Tour of Kali tools and servicesLecture 9 OWASP - introductionSection 3: Linux - Getting started and must have basicsLecture 10 what to expect in section 3Lecture 11 creating files and traveling in linuxLecture 12 Exploring linux file systemLecture 13 Files and persmissionsLecture 14 Linux networking commandsSection 4: Prepare yourself before PentestingLecture 15 what to expect in section 4Lecture 16 Introducing TOR and DARKNET worldLecture 17 Proxychains - Multilevel AnonymityLecture 18 MAC address - masking MAC and detailsLecture 19 DNSENUM - gathering informationLecture 20 Zone transfer VulnerabilityLecture 21 DIG - Gather data with digLecture 22 DNSTracer and wireshark basicsLecture 23 Dimitry - old still powerfullLecture 24 Finding emails, subdomain and generating reportsLecture 25 Assignment and reconSection 5: OWASP - Vulnerability practicals and SafeguardsLecture 26 what to expect in section 5Lecture 27 Code quality and source code analysisLecture 28 OS command InjectionLecture 29 Basics of Cross Site ScriptingLecture 30 Reflected XSSLecture 31 Stored XSSLecture 32 Cross site request ForgeryLecture 33 SQL injectionLecture 34 Upload Vulnerabilities, shell and defacingLecture 35 JSON injection and web scarabLecture 36 DOM based Cross site scriptingSection 6: Advance attacks and automationLecture 37 BeEF and XSS automation and PoCLecture 38 SQLi Lab setup and 5 hour of free resource on sql injectionLecture 39 SQLMap and error based injectionLecture 40 Time based and blind sql injectionLecture 41 Forgot password vulnerabilityLecture 42 Session mismanagement flawsSection 7: Home labs - Hack me casino and othersLecture 43 Introducing Hackme casinoLecture 44 HackMeCasino VulnerabilitiesLecture 45 Assignment - Cheese app test bedLecture 46 Thanking noteinterested in securing your web application,Interested in Becoming Bug bounty hunter,web developers,Ethical hacker,pentestersHomepagehttps://www.udemy.com/course/web-application-penetration-testing-and-bug-bounty-course/Rapidgator Links Downloadhttps://rg.to/file/6af939673638c48c034a358a697e7220/cgvee.Web.Application.Penetration.Testing.And.Bug.Bounty.Course.part1.rar.htmlhttps://rg.to/file/d9c98eb56014e09d180fce9feb9730e1/cgvee.Web.Application.Penetration.Testing.And.Bug.Bounty.Course.part2.rar.htmlFikper Links Downloadhttps://fikper.com/RW0iq010lb/cgvee.Web.Application.Penetration.Testing.And.Bug.Bounty.Course.part2.rar.htmlhttps://fikper.com/eCTZJUPlY2/cgvee.Web.Application.Penetration.Testing.And.Bug.Bounty.Course.part1.rar.htmlNo Password - Links are Interchangeable Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now