Join 140,000+ students in learning cyber security, pentesting and ethical hacking! Learn everything you need today!

What you will learn

Website hacking

Penetration testing

How to find vulnerabilities

How to secure vulnerabilities

How to exploit vulnerabilities

Computer security fundamentals

How to secure and exploit the OWASP Top 10

Cyber security

Ethical Hacking

How to identify bug bounties

Black hat hacker/red team techniques

SQL injection

Cross site scripting (XSS)

Web application security

Description

Computer security is one of the biggest job gaps in history, with a shortage of 3.5 million skilled workers needing to tackle a problem estimated to be worth $6 trillion. This is one of the biggest opportunities in history.

When I was at university I did a lot of security courses and to be honest I was pretty frustrated at how they were taught. The concepts and their importance captured my imagination but I knew it could be taught in a better way… so I created a few YouTube videos on the topic. They were very well received… So well received that after a few years working in industry I decided to make this course.

Although this course covers practical methods for breaking into and securing systems, most of the lectures focus on principals which allow you to properly understand the concepts. This differs from a lot of courses on Udemy that teach specific tools that will be out of date next year. This course is designed to teach the next thought leaders of the industry… ones who are capable of making tools that make everything before it seem outdated.

This course covers all the topics of several of my courses at university. It’s not long, it’s light hearted, and doesn’t feel dense… but all the content is there.

English

Language

Content

Injection

Be Ethical. Never Hack.

Never Hack

Injection Intro

SQL Injection

XML Injection

Library Bloat

Cross Site Scripting (XSS)

Injection Defense

Do I need to worry about injection here?

Core Knowledge

Common Terms

Phishing

Ethics & Legality

Basics

Attack Surface

0 days

Brute Force

Misconceptions


Get Instant Notification of New Courses on our Telegram channel.


Core Knowledge Quiz

Security Mindset

Security Mindset

Client Side and Server Side

Client and Server Side

Client and Server Side Quiz

Authentication and Access Control

Authentication and Access Control

Authentication and Access Control Quiz

Cryptography

What is a Cryptographic Hash?

How is Hashing Useful?

Hash Attacks

Cryptographic Hash Defense

Encryption

Cryptography Quiz

Cross Site Request Forgery

Cross Site Request Forgery

CSRF Quiz

Deployment

DDoS – Distributed Denial of Service

Configuration

Passwords

Deployment Quiz

External Packages

External Packages

Implement or Import?

External Packages Quiz

Monitoring and Response

Shocking Figures

Identifying an Attack

Honeypots

Breach Response and Defense

Monitoring and Response Quiz

Conclusion

OWASP Top 10

Conclusion