Udemy - Pentesting and Securing Web Applications (Ethical Hacking)
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size4.6 GB
- Uploaded Bytutsnode
- Downloads126
- Last checkedDec. 05th '20
- Date uploadedDec. 03rd '20
- Seeders 34
- Leechers37
Description
Computer security is one of the biggest job gaps in history, with a shortage of 3.5 million skilled workers needing to tackle a problem estimated to be worth $6 trillion. This is one of the biggest opportunities in history.
When I was at university I did a lot of security courses and to be honest I was pretty frustrated at how they were taught. The concepts and their importance captured my imagination but I knew it could be taught in a better way… so I created a few YouTube videos on the topic. They were very well received… So well received that after a few years working in industry I decided to make this course.
This course covers all the topics of several of my courses at university. It’s not long, it’s light hearted, and doesn’t feel dense… but all the content is there.
Who this course is for:
University students studying computer science or a related field
Tinkerers wanting to ensure their apps are secure
Employees wanting to improve the cyber security of their firm
Developers interested in learning security
Requirements
Ability to write programs
Basic knowledge of a programming language
(Not required) Preferably have written a mobile or web app before
Last Updated 11/2020
Files:
Pentesting and Securing Web Applications (Ethical Hacking) [TutsNode.com] - Pentesting and Securing Web Applications (Ethical Hacking) 3. Security Mindset- 1. Security Mindset.mp4 (412.7 MB)
- 1. Security Mindset.srt (28.8 KB)
- 1. Be Ethical. Never Hack..mp4 (11.1 MB)
- 1. Be Ethical. Never Hack..srt (0.8 KB)
- 2. Never Hack.html (0.2 KB)
- 3. Injection Intro.mp4 (190.2 MB)
- 3. Injection Intro.srt (14.2 KB)
- 4. SQL Injection.mp4 (251.6 MB)
- 4. SQL Injection.srt (20.0 KB)
- 5. XML Injection.mp4 (114.3 MB)
- 5. XML Injection.srt (8.6 KB)
- 6. Library Bloat.mp4 (53.4 MB)
- 6. Library Bloat.srt (3.6 KB)
- 7. Cross Site Scripting (XSS).mp4 (115.0 MB)
- 7. Cross Site Scripting (XSS).srt (9.1 KB)
- 8. Injection Defense.mp4 (129.4 MB)
- 8. Injection Defense.srt (10.0 KB)
- 9. Do I need to worry about injection here.html (0.2 KB)
- 10. Pentesting using injection.html (0.2 KB)
- 1. Common Terms.mp4 (145.4 MB)
- 1. Common Terms.srt (10.8 KB)
- 2. Phishing.mp4 (66.8 MB)
- 2. Phishing.srt (5.4 KB)
- 3. Ethics & Legality.mp4 (130.6 MB)
- 3. Ethics & Legality.srt (10.0 KB)
- 4. Basics.mp4 (80.6 MB)
- 4. Basics.srt (6.1 KB)
- 5. Attack Surface.mp4 (152.7 MB)
- 5. Attack Surface.srt (10.8 KB)
- 6. 0 days.mp4 (75.3 MB)
- 6. 0 days.srt (6.1 KB)
- 7. Brute Force.mp4 (206.1 MB)
- 7. Brute Force.srt (15.4 KB)
- 8. Misconceptions.mp4 (95.8 MB)
- 8. Misconceptions.srt (7.8 KB)
- 9. Core Knowledge Quiz.html (0.2 KB)
- 1. Client and Server Side.mp4 (153.0 MB)
- 1. Client and Server Side.srt (10.8 KB)
- 2. Client and Server Side Quiz.html (0.2 KB)
- 1. Authentication and Access Control.mp4 (142.2 MB)
- 1. Authentication and Access Control.srt (11.9 KB)
- 2. Authentication and Access Control Quiz.html (0.2 KB)
- 1. What is a Cryptographic Hash.mp4 (42.1 MB)
- 1. What is a Cryptographic Hash.srt (3.1 KB)
- 2. How is Hashing Useful.mp4 (93.5 MB)
- 2. How is Hashing Useful.srt (6.4 KB)
- 3. Hash Attacks.mp4 (183.6 MB)
- 3. Hash Attacks.srt (11.2 KB)
- 4. Cryptographic Hash Defense.mp4 (67.5 MB)
- 4. Cryptographic Hash Defense.srt (5.4 KB)
- 5. Encryption.mp4 (160.2 MB)
- 5. Encryption.srt (12.1 KB)
- 6. Cryptography Quiz.html (0.2 KB)
- 1. Cross Site Request Forgery.mp4 (150.4 MB)
- 1. Cross Site Request Forgery.srt (11.1 KB)
- 2. CSRF Quiz.html (0.2 KB)
- 1. DDoS - Distributed Denial of Service.mp4 (180.8 MB)
- 1. DDoS - Distributed Denial of Service.srt (13.2 KB)
- 2. Configuration.mp4 (198.3 MB)
- 2. Configuration.srt (15.0 KB)
- 3. Passwords.mp4 (124.1 MB)
- 3. Passwords.srt (10.5 KB)
- 4. Deployment Quiz.html (0.2 KB)
- 1. External Packages.mp4 (219.0 MB)
- 1. External Packages.srt (17.1 KB)
- 2. Implement or Import.mp4 (91.1 MB)
- 2. Implement or Import.srt (7.6 KB)
- 3. External Packages Quiz.html (0.2 KB)
- 1. Shocking Figures.mp4 (63.0 MB)
- 1. Shocking Figures.srt (5.8 KB)
- 2. Identifying an Attack.mp4 (107.2 MB)
- 2. Identifying an Attack.srt (9.3 KB)
- 3. Honeypots.mp4 (28.4 MB)
- 3. Honeypots.srt (2.7 KB)
- 4. Breach Response and Defense.mp4 (117.6 MB)
- 4. Breach Response and Defense.srt (9.9 KB)
- 5. Monitoring and Response Quiz.html (0.2 KB)
- 6. Create a Breach Response Plan.html (0.2 KB)
- 1. OWASP Top 10.mp4 (326.2 MB)
- 1. OWASP Top 10.srt (25.6 KB)
- 2. Conclusion.mp4 (8.0 MB)
- 2. Conclusion.srt (0.7 KB)
- TutsNode.com.txt (0.1 KB)
- [TGx]Downloaded from torrentgalaxy.to .txt (0.6 KB)
Code:
- udp://inferno.demonoid.pw:3391/announce
- udp://tracker.openbittorrent.com:80/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://torrent.gresille.org:80/announce
- udp://glotorrents.pw:6969/announce
- udp://tracker.leechers-paradise.org:6969/announce
- udp://tracker.pirateparty.gr:6969/announce
- udp://tracker.coppersurfer.tk:6969/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://9.rarbg.to:2710/announce
- udp://shadowshq.yi.org:6969/announce
- udp://tracker.zer0day.to:1337/announce