www.udemy.com
Open in
urlscan Pro
2606:4700::6812:a05a
Public Scan
URL:
https://www.udemy.com/course/mastering-hacking-and-penetration-testing-5-courses-pack/?couponCode=CYBERSAMURAI
Submission: On February 28 via manual from US — Scanned from DE
Submission: On February 28 via manual from US — Scanned from DE
Form analysis
3 forms found in the DOM/courses/search/
<form action="/courses/search/" class="ud-search-form-autocomplete-input-group ud-search-form-autocomplete-input-group-reversed"><input type="hidden" name="src" value="ukw"><input type="text" aria-invalid="false" name="q"
placeholder="Suche nach einem beliebigen Thema" autocomplete="off" value="" role="combobox" aria-autocomplete="both" aria-haspopup="true" aria-expanded="false" aria-controls="u208-search-form-autocomplete--3-menu-content-items"
id="u208-search-form-autocomplete--3" class="ud-text-input ud-text-input-small ud-text-sm ud-search-form-autocomplete-input js-header-search-field"><button type="submit" disabled=""
class="ud-btn ud-btn-large ud-btn-ghost ud-heading-md ud-btn-disabled ud-btn-icon ud-btn-icon-large" tabindex="-1"><svg aria-label="Suche starten" role="img" focusable="false" class="ud-icon ud-icon-medium ud-icon-color-neutral">
<use xlink:href="#icon-search"></use>
</svg></button></form>
<form data-purpose="coupon-form" class="text-input-form-module--text-input-form--9uxfY"><input aria-invalid="false" data-purpose="coupon-input" placeholder="Gutschein eingeben" id="u210-form-group--17" type="text"
class="ud-text-input ud-text-input-medium ud-text-sm" value=""><button type="submit" data-purpose="coupon-submit" class="ud-btn ud-btn-medium ud-btn-primary ud-heading-sm"><span>Anwenden</span></button></form>
<form data-purpose="coupon-form" class="text-input-form-module--text-input-form--9uxfY"><input aria-invalid="false" data-purpose="coupon-input" placeholder="Gutschein eingeben" id="u210-form-group--111" type="text"
class="ud-text-input ud-text-input-medium ud-text-sm" value=""><button type="submit" data-purpose="coupon-submit" class="ud-btn ud-btn-medium ud-btn-primary ud-heading-sm"><span>Anwenden</span></button></form>
Text Content
Weiter zum Inhalt Kategorien * * * * * * * * * * * * * Suche nach einem beliebigen Thema Udemy Business Gib deinem Team Zugriff auf über 19.000 immer und überall verfügbare Top-Udemy-Kurse. Udemy Business ausprobieren Bei Udemy unterrichten Hier kannst du dein Wissen und Können an Millionen von Teilnehmern in aller Welt weitergeben und damit richtig Geld verdienen! Weitere Infos Anmelden Registrieren EnglishDeutschEspañolFrançaisBahasa IndonesiaItaliano日本語한국어NederlandsPolskiPortuguêsRomânăРусскийภาษาไทยTürkçeTiếng Việt中文(简体)中文(繁體) Entwicklung Webentwicklung Data Science Mobile-Entwicklung Programmiersprachen Spieleentwicklung Datenbankdesign & Entwicklung Software-Testing Software-Engineering Softwareentwicklungs-Tools Programmierung ohne Code Business Unternehmensgründung Kommunikation Management Vertrieb Businessstrategie Operations Projektmanagement Wirtschaftsrecht Business-Analyse und BI Personalwesen Industrie E-Commerce Medien Immobilien Sonstiges in Business Finanzen & Rechnungswesen Rechnungswesen & Buchhaltung Compliance Kryptowährungen & Blockchain Ökonomie Finanzen Zertifizierung im Finanzbereich und Prüfungsvorbereitung Finanzmodellierung & Finanzanalyse Investition & Trading Geld-Management-Tools Steuern Sonstiges in Finanzen & Rechnungswesen IT & Software IT-Zertifizierungen Netzwerk & Sicherheit Hardware Betriebssysteme & Server Sonstiges in IT & Software Office-Produktivität Microsoft Apple Google SAP Oracle Sonstiges in Office-Produktivität Persönliche Entwicklung Persönliche Veränderung Persönliche Produktivität Leadership Karriereentwicklung Erziehung & Beziehung Glücklich leben Esoterische Praktiken Religion & Spiritualität Selbstvermarktung Kreativität Einflussnahme Selbstwertgefühl & Selbstvertrauen Stressbewältigung Gedächtnis & Lerntechniken Motivation Sonstiges in Persönliche Entwicklung Design Webdesign Grafikdesign & Illustration Designtools UX-Design Spieledesign 3D & Animation Modedesign Architekturdesign Innenarchitektur Sonstiges in Design Marketing Digitales Marketing Suchmaschinenoptimierung Social-Media-Marketing Branding Marketinggrundlagen Marketinganalyse & -automatisierung Öffentlichkeitsarbeit Bezahlte Werbung Video- & Mobile-Marketing Content-Marketing Growth Hacking Affiliate-Marketing Produktmarketing Sonstiges in Marketing Lifestyle Kunst & Kunsthandwerk Schönheit & Makeup Esoterische Praktiken Essen & Trinken Spiele Heimwerken & Gärtnern Haustierpflege & Training Reisen Sonstiges in Lifestyle Fotografie & Video Digitale Fotografie Fotografie Porträtfotografie Fotografietools Gewerbliche Fotografie Videodesign Sonstiges in Fotografie & Video Gesundheit & Fitness Fitness Allgemeine Gesundheit Sport Ernährung & Diäten Yoga Mentale Gesundheit Martial Arts & Selbstverteidigung Sicherheit & Erste Hilfe Tanz Meditation Sonstiges in Gesundheit & Fitness Musik Instrumente Musikproduktion Musikgrundlagen Gesang Musiktechniken Musiksoftware Sonstiges in Musik Wissenschaft & Lehre Technische Wissenschaften Geisteswissenschaften Mathematik Naturwissenschaften Online-Unterricht Sozialwissenschaften Sprachen lernen Lehrausbildung Prüfungsvorbereitung Sonstiges in Wissenschaften & Lehre Webentwicklung JavaScript React JS CSS Angular Node.Js TypeScript HTML5 ASP.NET Core AWS-Zertifizierung Microsoft-Zertifizierung AWS Certified Solutions Architect – Associate AWS Certified Cloud Practitioner CompTIA A+ Amazon AWS CompTIA Security+ Cisco CCNA Microsoft AZ-900 Microsoft Power BI SQL Datenmodellierung Tableau Business-Analyse Datenanalyse Business Intelligence Data Warehouse DAX Unity Unreal Engine Spieleentwicklung (Grundlagen) C# Entwicklung von 3D-Spielen C++ 2D-Spieleentwicklung Unreal Engine Blueprints Blender Google Flutter Android-Entwicklung iOS-Entwicklung React Native Swift Dart (Programmiersprache) SwiftUI Kotlin Mobile-App-Entwicklung Grafikdesign Photoshop Adobe Illustrator Zeichnen Canva Digitales Malen Procreate (App für digitales Zeichnen) InDesign Designtheorie Life-Coach-Ausbildung Persönliche Entwicklung NLP (Neuro-Linguistisches Programmieren) Persönliche Veränderung Klangtherapie Sinn des Lebens Achtsamkeit Emotionale Intelligenz Kognitive Verhaltenstherapie (CBT) Business (Grundlagen) Unternehmensgründung (Grundlagen) Freiberuflichkeit Online-Business Businessstrategie Startup Bloggen Businessplan Selbstständigkeit Digitales Marketing Social-Media-Marketing Marketingstrategie Texten Google Analytics Startup Internet-Marketing E-Mail-Marketing Werbestrategie 2023-02-17T10:38:22Z Kursvorschau ansehen Aktueller Preis12,99 € Ursprünglicher Preis19,99 € Rabatt35 % Rabatt In den Einkaufswagen Jetzt kaufen 30-Tage-Geld-zurück-Garantie DAS IST IM KURS ENTHALTEN: * 59,5 Stunden On-Demand-Video * 9 zum Download verfügbare Materialien * Uneingeschränkter lebenslanger Zugriff * Zugriff auf Handy/Tablet und TV * Abschlussbescheinigung TeilenKurs verschenkenGutschein anwenden CYBERSAMURAI wurde angewendet. Gutschein anwenden Anwenden WEITERBILDUNG FÜR 5 ODER MEHR PERSONEN? Gib deinem Team Zugriff auf über 19.000 immer und überall verfügbare Top-Udemy-Kurse. Udemy Business ausprobieren LEARN ETHICAL HACKING AND PENETRATION TESTING 5 COURSES PACK Bewertung: 4,5 von 54,5 (606 Bewertungen) 4.010 Teilnehmer Aktueller Preis12,99 € Ursprünglicher Preis19,99 € Jetzt kaufen IT & SoftwareNetzwerk & SicherheitEthical Hacking Kursvorschau ansehen LEARN ETHICAL HACKING AND PENETRATION TESTING 5 COURSES PACK 5 Courses pack to Make You Expertise in Ethical Hacking from basics to advanced levels of Web & mobile apps pen-testing. Bewertung: 4,5 von 54,5 (606 Bewertungen) 4.010 Teilnehmer Erstellt von InSEC- Techs Zuletzt aktualisiert am 1/2023 Englisch Englisch [autom.] Aktueller Preis12,99 € Ursprünglicher Preis19,99 € Rabatt35 % Rabatt In den Einkaufswagen Jetzt kaufen 30-Tage-Geld-zurück-Garantie Uneingeschränkter lebenslanger Zugriff TeilenKurs verschenkenGutschein anwenden CYBERSAMURAI wurde angewendet. Gutschein anwenden Anwenden ÜberblickKursplanDozentBewertungen DAS WIRST DU LERNEN * You will learn Linux and Windows CLI Tutorials * You will learn from basics to ADVANCED level of Ethical Hacking course to become Professional Penetration Tester * You will learn & Expertise WiFi Hacking in Depth * You will learn Hacking / pentesting web sites & server (in WAPT Course) * You will learn Metasploit (Basics to advanced Level) * You will learn mobile apps (Android & iOS ) penetration testing * You will learn total 5 courses. * You will become pro Pen-Tester with all skills to handle Penetration Testing projects as an employee or Freelancer. ANFORDERUNGEN * Basics computer knowledge & computer networking BESCHREIBUNG Welcome to the world of Ethical Hacking. As a student in this field, you will have the opportunity to learn about the latest technologies and techniques for protecting computer systems and networks from a wide variety of threats. You will also gain a deep understanding of the complex legal and ethical issues surrounding cyber security, and develop the critical thinking and problem-solving skills necessary to stay ahead of cyber criminals. The field of cyber security is constantly evolving, and as a student, you will be at the forefront of this exciting and challenging field. In this 5 course pack you will learn Ethical Hakcing, web and mobile application penetration testing and Metasploit course and You will also have the opportunity to work on live targets and simulations that will give you practical experience in protecting and defending computer systems and networks. As cyber threats continue to increase in both frequency and sophistication, the demand for skilled cyber security professionals is growing rapidly. As a student of this program, you will be well-prepared for a career in this exciting and rapidly-evolving field. You will have the opportunity to work in a variety of roles such as security analyst, network administrator, and information security officer. You are joining the cyber security field at an exciting time and we are looking forward to working with you and supporting you as you develop the skills and knowledge necessary to become a successful cyber security professional. This course is 5 courses bundled as single course title "MASTERING ETHICAL HACKING AND PENETRATION TESTING", the biggest Course to Make You MASTERS in Hacking,Courses covers from basics to advanced levels of Web & mobile apps pen-testing. Course 1: Learn Ethical Hacking from Entry to Expertise Course 2: Web Application Penetration Testing Course 3: Penetration Testing with Metasploit Course 4: Android Application Penetration Testing Course 5: iOS Application Penetration Testing ------------------------------------------------------------------------------------------------------------------------------------ About Course 1: Learn ETHICAL HACKING from Entry to Expertise InSEC-Techs " Learn ETHICAL HACKING from Entry to Expertise" Course is IT Security (Offensive) Security Course that teaches you how to find vulnerabilities (bugs or loopholes, like coding mistakes, configuration mistakes or errors etc) in any applications and Network infrastructures including networking devices, mobiles etc- Web Application Penetration is specific to digging the same specific to web applications- In this course you will learn how to find critical information that helps you to hack into computer / applications, later tool, techniques and technologies that help you to penetrate (hack) into your target- Ethical Hackers have high demand and have excellent job scope around the world- You can just dig information in job portals about the job scope and salaries paid Ethical Hacking Course is most comprehensive Ethical Hacking Course that is made for students to make their career in the domain of IT-Security and we IST team help students in making the career , right from helping them in resume preparation, interview question bank etc. About Course 2: Web Application Penetration Testing Web Application Penetration Testing (WAPT) Course is IT Security (Offensive) Security Course that teaches you how to find (Manual & Tool based techniques) vulnerabilities (bugs or loopholes, like coding mistakes, configuration mistakes or errors etc) specific to web applications & web servers. This course is highly comprehensive made of 78 video lectures of 17 hours and PDF & Vulnerable Website materials for practice. About Course 3: Penetration Testing with Metasploit From Wikipedia: The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research. The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework. 95% of Security professionals use distribution like Kali Linux/Backtrack which consists tons of tools that aids pen-testers to perform audits and Metasploit Framework is highly sophisticated tool. The course is designed as a complete guide to understand and handle Metasploit Tool efficiently in real time About Course 4: Android Application Penetration Testing Android Application Penetration Testing is a division of PENETRATION TESTING Domain that concentrates on PenTesting Android applications on Android devices like mobiles and tablets. This course is intended students/professionals who are intended to make career in mobile penetration testing domain. The course covers in and out of , actually Hacking (Penetration) Android Apps and INSEC-TECHS have developed vulnerable Android Apps for students to practice Labs. INSEC-TECHS will share 14 such applications to learn Hacking Android Mobile Applications with crack challenges. Both InSEC-Techs iOS and Android Application Penetration Testing course is a highly practical and hands on video course. This course focuses on beginners as well as advanced users. Instructor has created all the required vulnerable applications in order for you to practice all the hands-on exercises demonstrated in this course in a legal environment. This course begins with very basics keeping beginners in mind. Even if you have worked on some Android app security assessments, there will be something new for you. After completing this course, you will learn where to start iOS app penetration testing, Pen-testing iOS Apps, Network monitoring on iDevices and finally some automated tools to complete the task. It contains more than 14 challenges to crack. Instructor explains all the solutions when and where it is required. The course is designed as a complete guide to understand and practice Android Mobile app hacking efficiently in real time. We provide you material and references to get more understanding and learning this tool. The course is very well structured, explaining the terminologies , functionality and lab practicals are very well shown as feeding baby a banana. About Course 5: iOS Application Penetration Testing iOS Application Penetration Testing is a division of PENETRATION TESTING Domain that concentrates on Pen-Testing iOS Mobile Apps. This course is intended students/professionals who are intended to make career in mobile penetration testing domain. The course covers in and out of , actually Hacking (Penetration) iOS Apps and INSEC-TECHS have developed vulnerable iOS Apps for students to practice Labs. INSEC-TECHS will share 11 such applications to learn Hacking iOS Mobile Applications. iOS Application Penetration Testing course is a highly practical and hands on video course. This course focuses on beginners as well as advanced users. Instructor has created all the required vulnerable applications in order for you to practice all the hands-on exercises demonstrated in this course in a legal environment. This course begins with very basics keeping beginners in mind. Even if you have worked on some iOS app security assessments, there will be something new for you. After completing this course, you will learn where to start iOS app penetration testing, Pentesting iOS Apps, Network monitoring on iDevices and finally some automated tools to complete the task. It contains more than 14 challenges to crack. Instructor explains all the solutions whenand where it is required. The course is designed as a complete guide to understand and practice iOS Mobile app hacking efficiently in real time. We provide you material and references to get more understanding and learning this tool.The course is very well structured, explaining the terminologies , functionality and lab practicals are very well shown FÜR WEN EIGNET SICH DIESER KURS: * Anyone with basic knowledge of computers * Anyone who want to make careen in Hacking/PenTesting domain. * Anyone who want to explore the knowledge on Cyber Security. Mehr zeigenWeniger zeigen KURSINHALT 9 Abschnitte • 332 Lektionen • 59 Std. 41 Min. Gesamtdauer Alle Abschnitte ausklappen ETHICAL HACKING- COURSE INTRODUCTION AND BASICS6 LEKTIONEN • 1 STD. 29 MIN. * Ethical Hacking - TERMINOLOGIES Vorschau43:05 * Necessity of Ethical Hacking Vorschau09:31 * Understanding Hacking - Scenario Based Vorschau16:34 * Elements Of Security Vorschau05:12 * Ethical Hacking - Phases Vorschau05:59 * Onfloor Penetration Testing Approach Vorschau08:22 ETHICAL HACKING - NETWORKING BASICS7 LEKTIONEN • 3 STD. 5 MIN. * Networking Devices Vorschau33:07 * MAC Address Vorschau14:33 * IP Address Vorschau32:34 * Ports and Protocols Vorschau32:42 * OSI Model Vorschau28:28 * TCP 3 Way Handshake Vorschau36:47 * Internet Governance 07:07 ETHICAL HACKER - HOME LAB SETUP24 LEKTIONEN • 8 STD. 53 MIN. * Hypervisors 05:51 * VirtualBox Installation 05:06 * Kali Linux - Part-1 36:28 * Kali Linux - Part-2 28:38 * BlackArch OS Installation 36:39 * Parrot OS Installation 16:16 * Linux File System 10:40 * Linux Command Line Tutorials Part 1 01:12:18 * Class 8 - Linux Command Line Tutorials Part 2 34:43 * Windows Command Line Tools 21:08 * Class 11 - Active Directory Introduction ( Part 1 ) 06:56 * Active Directory Introduction - Part 2 14:11 * Active Directory Introduction - Part 3 08:11 * Windows Server - 2019 Installation 10:50 * Domain Controller & DHCP Setup 24:22 * Windows 10 - OS Installation 10:33 * Creating Users Account & Computer Accounts on DC 25:16 * DNS Server setup on Domian Controller 18:04 * IIS WebServer Setup 09:09 * XAMPP Server Setup 10:41 * Metasploitable Setup 11:53 * Router Configuration - Part 1 22:47 * Router Configuration - Part 2 01:23:30 * Installing Android OS on VirtualBox 08:36 PRIVACY AND ANONYMITY8 LEKTIONEN • 2 STD. 24 MIN. * Security Privacy and Anonymity 09:22 * MacChanger in Kali Linux 04:49 * Virtual Private Network -VPNs 14:53 * Setup VPN on Windows Machine 10:30 * Setup VPN on Kali Linux 07:26 * The Onion Routing (TOR) Browser 23:27 * Proxychains and DNS leak 54:52 * Anonsurf Application for System Wide Anonymity 19:06 HACKING - PRE AND POST EXPLOITATION54 LEKTIONEN • 11 STD. 52 MIN. * 6-Reconnaisance 26:14 * 7-1-Google Hacking 18:24 * 8and9-1-Scanning and Enumeration 25:40 * 8and9-2-APS 04:46 * 8and9-3-Nmap 09:18 * 8and9-4-LBD 02:05 * 8and9-5-Scan 02:51 * 8and9-6-DumpSec 06:42 * 10-System Hacking Part 1 12:06 * 10-System Hacking Part 2 08:43 * 10-System Hacking Part 3 08:34 * 10-System Hacking Part 4 05:04 * 11-1-Proxy Servers 27:28 * 11-3Proxy-tor 03:39 * 12- Keyloggers 05:16 * 13-Trojans 20:23 * 14-Virus 17:40 * 15-Social Engineering 15:39 * 16-Email Hacking 21:42 * 17-1-Sniffing 09:23 * 17-2-SniffWireshark 19:22 * 17-3-cain-able 08:28 * 18-1Session-Hijack 08:06 * 18-2Session-Hijack 05:14 * 18-3Session-Hijacking 02:41 * 19-Web Server Hacking 28:03 * 20-1-SQL Injection 06:57 * 20-2-SQL Injection 25:03 * 21-1-Cross Site Scripting 11:18 * 21-2-Cross Site Scripting 20:58 * 22-CSRF Part 1 10:39 * 22-CSRF Part 2-TESTER DEMO 07:09 * 22-CSRF Part 3 - Countermesures 02:14 * 23- Remote File Inclusion 05:44 * 24 and 25 Introduction to Exploit Writing- Buffer Overflows 37:10 * 26-Reverse-Engineering 34:43 * 27Cryptography 24:43 * 28-Firewalls 28:49 * 29-Denial Of Service Part - 1 07:15 * 29-Denial Of Service Part - 2 07:15 * 30-Physical Security 08:18 * 31-Wireless Hacking 11:06 * 32-Metasploit Part 1 20:52 * 32-Metasploit Part 2 08:17 * 33-Penetration Testing Part 1 04:44 * 33-Penetration Testing Part 2 10:53 * 33-Penetration Testing Part 3 05:27 * 34-Router Hacking 26:30 * 35-Mobile Hacking 34:35 * 36-Web App Pentesting Part 1 11:47 * 36-Web App Pentesting Part 2 02:38 * 36-Web App Pentesting Part 3 02:47 * 36-Web App Pentesting Part 4 08:15 * 36-Web App Pentesting Part 5 01:55 COURSE 2: WEB APPLICATION PENETRATION TESTING80 LEKTIONEN • 16 STD. 55 MIN. * 1-WAPT Course Introduction 24:04 * 2-Introduction to Web Applications 12:43 * 3-Uses of Web Applications 07:50 * 4-Client Server Architecture 15:11 * 5-Working with Protocols – Video 1 24:25 * 6-Working with Protocols – Video 2 12:46 * 7-Web Application Technologies – Video 1 17:05 * 8-Web Application Technologies – Video 2 12:25 * 9-Protocol Status Codes – Video1 15:09 * 10-Protocol Status Codes – Video 2 07:28 * 11-1-Web Server & Client — Video 1 11:35 * 11-2-Web Server & Client — Video 2 05:24 * 11-3-Web Server & Client — Video 3 13:38 * 11-4-Web Server & Client — Video 4.mp4 06:11 * 12-Necessity of Web Application Security 17:26 * 13-Offensive & Defensive Security Mechanism 15:14 * 14-1-OWASP Video 1 03:55 * 14-2-OWASP Video 2 29:07 * 14-3-OWASP Video 3 20:43 * 14-4-OWASP Video 4 09:14 * 14-5-OWASP Video 5 04:05 * 14-6-OWASP Video 6 04:38 * 14-7-OWASP Video 7 09:16 * 14-8-OWASP Video 8 02:00 * 14-9-OWASP Video 9 08:35 * 15-1 Mastering Security using WEB DOJO 02:15 * 15-2 Mastering Security using WEB DOJO – Video 2 39:15 * 16-Core Defence Mechanisms 11:45 * 17-1 Mapping Web Application – Video 1 07:27 * 17-2 Mapping Web Application – Video 2 05:26 * 17-3 Mapping Web Application – Video 3 07:48 * 18-2 ByPassing Client-side controls – Video 2 29:26 * 18-3 ByPassing Client-side controls – Video 3 11:22 * 18-4 ByPassing Client-side controls – Video 4 06:17 * 18-5 ByPassing Client-side controls – Video 5 12:07 * 18-6 ByPassing Client-side controls – Video 6 14:49 * 19-1 Attacking Authentications – Video 1 18:21 * 19-2 Attacking Authentications – Video 2 09:52 * 19-3 Attacking Authentications – Video 3 04:38 * 20-1 Attacking Session Management – Video 1 25:07 * 20-2 Attacking Session Management – Video 2 08:03 * 20-3 Attacking Session Management – Video 3 03:02 * 20-4 Attacking Session Management – Video 4 07:40 * 20-5 Attacking Session Management – Video 5 06:04 * 21-2 Attacking Access Controls – Video 2 07:56 * 22-1 Attacking Data Stores – Video 1 19:54 * 22-2 Attacking Data Stores – Video 2 08:15 * 22-3 Attacking Data Stores – Video 3 08:23 * 22-4 Attacking Data Stores – Video 4 18:33 * 22-5 Attacking Data Stores – Video 5 23:57 * 22-6 Attacking Data Stores – Video 6 06:00 * 22-7 Attacking Data Stores – Video 7 03:00 * 23-1 Attacking Backend components – Video 1 28:33 * 23-2 Attacking Backend components – Video 2 01:59 * 23-3 Attacking Backend components – Video 3 01:59 * 23-4 Attacking Backend components – Video 4 02:53 * 23-5 Attacking Backend components – Video 5 03:18 * 24-1Attacking Application Logic Video 1 01:26 * 24-2 Attacking Application Logic Video 2 07:37 * 24-3 Attacking Application Logic Video 3 12:21 * 25-1 Attacking Users – Video 1 40:52 * 25-2 Attacking Users – Video 2 40:25 * 26-2 Attacking Users – Video 3 25:06 * 26-3 Attacking Users – Video 4 02:45 * 27-1 Automated Customized Attacks – Video 1 23:19 * 27-2 Automated Customized Attacks – Video 2 04:19 * 27-3 Automated Customized Attacks – Video 3 17:19 * 28-1 Exploiting Information Disclosure – Video 1 28:58 * 28-2 Exploiting Information Disclosure – Video 1 10:52 * 29-Attacking Native Complied Application 13:41 * 30-1 Attacking Application Architecture – Video 1 15:30 * 30-2 Attacking Application Architecture – Video 2 06:26 * 31-1 Attacking Application Server – Video 1 15:57 * 31-2Attacking Application Server – Video 2 10:03 * 33-Finding Vulnerabilities in Source Code 21:52 * 34-Hackers Methodology & Reporting 20:41 * 35- Misc. Videos 04:03 * 35- Misc. Videos 06:59 * 35- Misc. Videos 03:12 * 35- Misc. Videos 06:10 COURSE 3: PENETRATION TESTING WITH METASPLOIT60 LEKTIONEN • 4 STD. 48 MIN. * 0.Course Introduction 03:19 * 1.Introduction to penetration testing 01:48 * 2.Introduction to PTES 01:05 * 3.PTES overview 03:11 * 4.settinng up lab 03:44 * 5.Setting up lab -live mode 04:08 * 6.Installing kali linux 02:49 * 7.configuring vulnerable thrid party test beds 02:49 * 8.snapshot and clone 04:26 * 9.metasploit 101 04:43 * 10.auxilary scanning 02:45 * 11.Introduction to exploits 03:21 * 12.excellent ranking exploits 04:55 * 13. Normal Ranking Exploits 02:32 * 14. Payloads 02:56 * 15. Creating database connectivity 04:52 * 16. Nessus installtion 04:32 * 17. Nessus Scanning-2 04:12 * 18.exploiting vulnerability based on nessus report 03:47 * 19. MSFConsole 04:25 * 20. MSFCLI 02:28 * 21. Armitage 06:16 * 22. Meterpreter 01:30 * 23. Working on meterpreter 04:38 * 24. Getting Meterpreter Access 05:33 * 25. Meterpreter core commands 08:38 * 26. Meterpreter-File-Commands 07:54 * 27. Meterpreter-user interface commands 09:41 * 28. Meterpreter-system-commands 09:45 * 29. Meterpreter-networking-commands 01:40 * 30.changing MAC attributes 11:44 * 31.introduction to client side attacks 02:23 * 32.msfpayload, msfencode, msfvenom 01:48 * 33.binary payload 06:28 * 34.vnc binary payload 04:04 * 35.vnc payload courtesy shell DISABLE 01:03 * 36.linux binary payload 04:14 * 37.stage-2-binary payload 07:01 * 38.Exploiting MS-Office documents using macros 06:21 * 39.exploiting pdf vulnerabilities 06:12 * 40.Adding persistent backdoor 04:09 * 41.exploiting software misconfiguration 06:52 * 42.exploiting fully patched machine 06:39 * 43.Browser based exploitation 07:03 * 44.Installing and configuring beef 07:03 * 45.Working on beef 03:24 * 46.working on beef modules 05:20 * 47.Loading MSF modules in to BeEF 04:37 * 48.Introduction to Social Engineering 12:24 * 49. SET installation 03:35 * 50.tabnabbing attack 08:21 * 51.webjacking 03:14 * 52.Introduction to Armitage and its installation 05:57 * 53.Post Exploitation over meterprerter using armitage 04:02 * 54.Veil-Framework-installation 03:10 * 55. Evading Anti Viruses using VeilFramework 06:42 * 56.Integerating Veil script into Armitage 02:12 * 57.Exploiting Victims machine using Armitage with Veil 03:34 * 58.Exploiting Victim Machine using customized powershell script 03:48 * 59.Installing Android Virtual Testbed 06:37 COURSE 4: ANDROID APPLICATION PENETRATION TESTING46 LEKTIONEN • 4 STD. 32 MIN. * 1.1 Introduction to Android 04:23 * 1.2 Android architecture Vorschau07:35 * 1.3 Software Installation Vorschau07:04 * 1.4 Creating an emulator 04:22 * 2.1 Android Security Model 06:50 * 2.2 App Sandboxing 08:00 * 2.3 Secure Interprocess Communication 10:15 * 2.4 Application Signing 08:16 * 2.5 App Permissions 07:25 * 3.1 App Structure 06:43 * 3.2 Building a simple app 11:29 * 4.1 M1 Introduction 02:52 * 4.21 M2-Shared Preferences 07:17 * 4.22 M2-Shared Preferences- Look at Code 03:39 * 4.23 M2 SQLITE 07:41 * 4.24 M2 SQLITE-Look at Code 03:26 * 4.31 M3 09:41 * 4.33 M3 10:13 * 4.34 M3 07:38 * 4.41 Unintended Data Leakage — Reading the clipboard 07:16 * 4.42 Unintended Data Leakage — Reading the clipboard – Look at Code 01:45 * 4.43 Unintended Data Leakage –Logging 05:09 * 4.44 Unintended Data Leakage –Logging — Look at Code 02:07 * 4.51 Poor Authorization and Authentication 03:42 * 4.61 Broken Cryptography 08:15 * 4.71 Client Side Attack– SQL Injection at Client Side 03:29 * 4.72 SQL INJECTION — LOOK AT CODE 02:58 * 4.73 Frame injection in webviews 02:18 * 4.74 Frame injection in webviews — Look at Code 02:44 * 4.81 Security Decisions via untrusted inputs — Intent Spoofing 05:08 * 4.91 Improper Session Handling 04:04 * 4-20 Lack of binary protection 02:16 * 4-21 Reversing android apps with APKTOOL 03:38 * 4-22 Reversing android apps with dex2jar & JD-GUI 03:23 * 4-23 Finding Content Provider URIs using APKTOOL. 03:20 * 5.1 Setting up drozer 05:03 * 5.2 Intent Spoofing 08:55 * 5.3 Content Provider Leakage 07:00 * 5.4 SQL Injection in Content Providers 09:52 * 6.1 A look at android exploit mitigatioin techniques 03:52 * 6.2 I m running ARM 02:45 * 6.3 GDB setup 06:28 * 6.4 Running a C program on your device 06:42 * 6.5 Format String Vulnerability 09:54 * 7.1 Introduction to mobile forensics 09:30 * 7.2 Mobile forensics - Part 2 05:23 COURSE 5: IOS APPLICATION PENETRATION TESTING47 LEKTIONEN • 5 STD. 44 MIN. * 2. Credits 03:00 * 3-introduction to iOS 04:23 * 4-iOS App basics 04:01 * 5 iOS Architecture 09:09 * 6- Settinng up Xcode 07:44 * 7-adding-functionality-to-helloworld-app 09:58 * 8 Inbuilt Security Model 09:04 * 9-SECURITY CONTROLs 07:26 * 10-JAILBREAKING BASICS 07:40 * 11-INSTALLATIONS 18:22 * 12-INSTALLING CHALLANGE APPS 07:48 * 13-IOS APP DIRECTORY STRUCTURE 12:01 * 14-SQLITE DATA 10:50 * 15-PLIST FILES 06:04 * 16-NSUSER DEFAULTS 03:41 * 17-CORE-DATA 05:36 * 18-KEYCHAIN 09:12 * 19-LOGGING 04:18 * 20-APP BACKGROUNDING 06:00 * 21-KEYBOARD CACHE 03:26 * 22-PASTEBOARD 02:50 * 23-SQL INJECTION 04:50 * 24-CROSS-SITE SCRIPTING ATTACKS - XSS 05:12 * 25-INTERCEPTING HTTP TRAFFIC 08:57 * 26-INTERCEPTING HTTPS TRAFFIC 07:16 * 27-MONITORING NETWORK TRAFFIC(TCPIP) 06:15 * 28-DUMPING CLASS INFORMATION OF PREINSTALLED APPS 06:17 * 29-DUMPING CLASS INFORMATION OF APPS INSTALLED FROM APP STORE 08:49 * 30-CYCRIPT BASICS 13:48 * 31-RUNTIME CODE INJECTION USING CYCRIPT 05:11 * 32-ACCESSING AND MODIFYING VARIABLES USING CYCRIPT 06:34 * 33-EXPLOITING AUTHENTICATION USING CYCRIPT 06:34 * 34-METHOD SWIZZLING USING CYCRIPT 05:47 * 35-BYPASSING JAILBREAK DETECTION USING CYCRIPT 09:42 * 36-METHOD SWIZZLING USING SNOOP-IT 12:04 * 37-APP MONITORING USING SNOOP-IT 03:27 * 38-RUNTIME ANALYSIS WITH GDB 08:45 * 39-RUNTIME ANALYSIS USING SNOOP-IT 12:04 * 40-CYDIA DEFAULT PASSWORD EXPLOITATION WITH METASPLOIT 08:10 * 41-CRACKING OPENSSH PASSWORDS USING HYDRA 05:21 * 42-METASPLOIT BINDSHELL ON IDEVICES 07:45 * 43-METASPLOIT REVERSE SHELL IDEVICES 08:44 * 44-INTRODUCTION TO REVERSE ENGINEERING 08:46 * 45-REVERSING IOS APPS-1 04:59 * 46-REVERSING IOS APPS-2 06:46 * 47-REVERSING IOS APPS-3 03:46 * 48-REVERSING IOS APPS-4 05:17 HÄUFIG ZUSAMMEN GEKAUFT LEARN ETHICAL HACKING AND PENETRATION TESTING 5 COURSES PACK 5 COURSES PACK TO MAKE YOU EXPERTISE IN ETHICAL HACKING FROM BASICS TO ADVANCED LEVELS OF WEB & MOBILE APPS PEN-TESTING.BEWERTUNG: 4,5 VON 5606 BEWERTUNGEN59,5 STD. GESAMT332 LEKTIONENALLE LEVELSAKTUELLER PREIS: 14,99 €URSPRÜNGLICHER PREIS: 19,99 € Dozent: InSEC- Techs Bewertung: 4,5 von 54,5(606) Aktueller Preis14,99 € Ursprünglicher Preis19,99 € WEBSITE HACKING / PENETRATION TESTING HACK WEBSITES & WEB APPLICATIONS LIKE BLACK HAT HACKERS AND SECURE THEM LIKE EXPERTS.BEWERTUNG: 4,5 VON 516924 BEWERTUNGEN10,5 STD. GESAMT100 LEKTIONENALLE LEVELSAKTUELLER PREIS: 24,99 €URSPRÜNGLICHER PREIS: 159,99 € Dozenten: Zaid Sabih, z Security Bewertung: 4,5 von 54,5(16.924) Aktueller Preis24,99 € Ursprünglicher Preis159,99 € Bestseller NETWORK HACKING CONTINUED - INTERMEDIATE TO ADVANCED LEARN ADVANCED TECHNIQUES TO HACK INTO WIFI & WIRED NETWORKS & WRITE OWN PYTHON SCRIPTS TO IMPLEMENT CUSTOM MITM ATTACKSBEWERTUNG: 4,5 VON 52981 BEWERTUNGEN10 STD. GESAMT83 LEKTIONENMITTELSTUFEAKTUELLER PREIS: 24,99 €URSPRÜNGLICHER PREIS: 159,99 € Dozenten: Zaid Sabih, z Security Bewertung: 4,5 von 54,5(2.981) Aktueller Preis24,99 € Ursprünglicher Preis159,99 € Gesamt: Aktueller Preis64,97 € Ursprünglicher Preis339,97 € Alle in den Einkaufswagen legen DOZENT InSEC- Techs Information Security Technologies * 4,4 Dozentenbewertung * 835 Bewertungen * 26.876 Teilnehmer * 3 Kurse InSEC-Techs (Information Security Technologies) www insectechs dot in is an integrated single-source IT training company providing classroom and distance courses like PHP, Ethical Hacking, Web Application Penetration Testing, Python, C language, Perl, CCNA and web development firm with uniquely competent, professional and creative website designing & internet marketing company providing full featured internet marketing solutions and web services including B2B & B2C e-commerce solutions which also acts as an offshore development center for overseas development firms to help them optimize their business significance in the global market- With one phone call you get a team of highly-skilled experts with a business-driven common-sense approach. InSEC-Techs ensure that individual care is taken in classroom while conducting sessions- We will not have more than seven students per batch in a single session to shoot more concentration on each student- Kiran Thirukovela, 38 years old Cyber-Techie and Cheif Executive Officer (CEO) of InSEC-Techs (Information Security Technologies) Dropped out B-Techs (ECE) by choice and B-SC (Computer Science)and stepped into the world of Computers and networking- Kiran holds IT certification like MCSA: Microsoft Certified System Administrator CCNA: Cisco Certified Network Administrator IINS: Implementing IOS Network Security Expert CCNP: Cisco Certified Network Professional CCNP-Sec: Cisco Certified Network Professional Security CCSP: Cisco Certified SecurityProfessional AFCEH: Ankit Fadia Certified Ethical Hacker CHFI: Computer Hacking Forensic Investigator Kiran Thirukovela has authored book "Cyber Crimes Investigations," A Book written for law enforcement agencies in india- Kiran is Network Security professional with 12+ years of experience and 10+ years of as Ethical Hacking trainer. He specialized in Web Application security, Penetration testing and Forensic investigation and solved cyber crime cases in India and kenya. Nipun Jaiswal: Nipun is well-known IT security Researcher, Well Known for his activities in the field of ethical hacking and cyber forensics. Mr. Nipun is an Independent security expert , who works on cyber crime cases and investigations , he was the Ex-CTO in Secugenius Security Solutions , Also He Worked As A Security Analyst in a Company.During His Career He has Pen-tested over 100+ Servers And Solved Many Cyber Crime Cases , He Has Trained Over 5000+ students in the field of ethical hacking and penetration testing , he is the currently the ambassador for EC-COUNCIL Programs In Lovely Professional University (First Indian University To Tie Up With EC-COUNCIL)- He is Currently Pursuing Masters In Technology (M-TECH) From LPU Itself - He Has Been The Speaker At Several National Level Confrences - His Security Research Papers Are Published Over Many Sites Like Packetstorm, SourceForge Etc. Mr. Nipun Jaiswas is author of book, "MASTERING METASPLOIT" and is available on Amazon. Achievements of His Careers: A) Certified Ethical Hacker (EC-COUNCIL C|EH) B) Certified Information Security Expert (CISE) C) Ankit Fadia's Certified Ethical Hacker (AFCEH 5-0) D) Winner Of Innobuzz Best Blog Competition (2010) E) Ambassador Of EC-COUNCIL @ Lovely Professional University F) Ex- Chief Technical Officer At Secugenius Security Solutions G)Ex- Security Analyst At Cyber Cure Solutions Delhi H) Founder/Admin Of Starthack. I) Founder/Admin Of Indian Cyber Police (Among Most Active HAcker's group of india) J) Administrator of various Forum K) Admin Of Hacker's Group Ap3x_nd_h4ck0 L) Respected V-I-P Member Of International Hacker's Forum (MADLEETS Pakistan) M) Presenter At HATCON LPU & HATCON KANPUR N)Presenter At DEFCON Groups (DC141001) 1-Defcon Rajasthan : 2- Defcon Punjab : O) Presently writing two books On Web application Hacking And Metasploit Framework P) Trained Over 5000 Students And Delivered Over 50+ Workshops Q) Worked On Cyber Crime Cases- R) Secured Over 1000 Domains S) Regular Author At Packet Storm Security. Mr- Srinivas Mr- Srininvas is Security Analyst and Ethical Hacking Trainer Since 10 Years and addressed over 50 workshops and Seminars- He is Co-Author of the Book "Hacking S3crets", along with Sai Satish and Aditya Gupta. Srininvas is also moderator of famous Hacking Forum based website andhrahackers and contributed SQL Injection articles to World's leading hacking magazine "hackin9"- Srininvas was honoured with "PRATHIBHA" Award by Govt- of Andhra Pradesh in Year 2008. Mehr zeigenWeniger zeigen 4,5 Kursbewertung606 Bewertungen Patrick G. Bewertung: 3,5 von 5Vor einem Monat PG * Melden His accent was hard to understand and the closed captioning was even worse. Hilfreich? Maringanti S. Bewertung: 5,0 von 5Vor einem Monat MS * Melden Excellent course for beginners with clear explanation Hilfreich? MD. Mehedi H. Bewertung: 3,5 von 5Vor einem Monat * Melden Here i get all in one course... Hilfreich? Adebileje Nurudeen O. Bewertung: 4,5 von 5Vor einem Monat * Melden Amazing... It's worth my expectations. Hilfreich? Alle Bewertungen anzeigen WEITERE KURSE VON INSEC- TECHS PENETRATION TESTING WITH METASPLOIT ETHICAL HACKING STREAM LEARN AND EXPERTISE METASPLOIT FRAMEWORK TOOLBEWERTUNG: 4,4 VON 542 BEWERTUNGEN5 STD. GESAMT60 LEKTIONENALLE LEVELSAKTUELLER PREIS: 14,99 €URSPRÜNGLICHER PREIS: 19,99 € Dozent: InSEC- Techs Bewertung: 4,4 von 54,4(42) 5 Std. gesamt60 LektionenAlle Levels Aktueller Preis14,99 € Ursprünglicher Preis19,99 € LEARN ETHICAL HACKING AND PENETRATION TESTING ONLINE PENTESTING EXPERISE COURSEBEWERTUNG: 4,1 VON 5187 BEWERTUNGEN1,5 STD. GESAMT12 LEKTIONENALLE LEVELS Dozent: InSEC- Techs Bewertung: 4,1 von 54,1(187) 1,5 Std. gesamt12 LektionenAlle Levels Aktueller PreisKostenlos Missbrauch melden Top-Unternehmen nutzen Udemy Business für die hochwertige Fortbildung ihrer Mitarbeiter. Deutsch * Udemy Business * Bei Udemy unterrichten * App herunterladen * Info zu Udemy * Kontakt * Jobs * Blog * Hilfe und Support * Affiliate-Partner * Investoren * Impressum Kontakt * Nutzungsbedingungen * Datenschutzbestimmungen * Cookie-Einstellungen * Sitemap * Erklärung zur Barrierefreiheit © 2023 Udemy, Inc. Wenn du auf „OK“ klickst, stimmst du der Speicherung von Cookies auf deinem Gerät zu, die zur Verbesserung der Website-Navigation, zur Analyse der Website-Nutzung sowie zur Optimierung unserer Marketingmaßnahmen verwendet werden.Datenschutzbestimmungen Einstellungen Alle ablehnen OK DATENSCHUTZEINSTELLUNGS-CENTER * COOKIE-EINSTELLUNGEN * FUNKTIONS-COOKIES * SOCIAL-MEDIA-COOKIES * WERBUNGS-COOKIES * NOTWENDIGE COOKIES * PERFORMANCE-COOKIES COOKIE-EINSTELLUNGEN Wir verwenden Cookies, um Informationen in deinem Browser zu speichern oder abzurufen. Dies können Informationen über dich, deine Einstellungen oder dein Gerät sein. Sie werden hauptsächlich dafür verwendet, dass die Website erwartungsgemäß funktioniert. Wir respektieren deine Privatsphäre und geben dir daher die Möglichkeit, bestimmte Arten von Cookies nicht zuzulassen. Klicke bitte auf die einzelnen Kategorieüberschriften, um dich genauer zu informieren und ggf. deine Einstellungen zu ändern. Wenn du bestimmte Cookies blockierst, kann dies deine Nutzung unserer Website und der von uns angebotenen Services beeinträchtigen. Weitere Infos FUNKTIONS-COOKIES Funktions-Cookies Inaktiv Mithilfe dieser Cookies können wir auf der Website zusätzliche Funktionen bereitstellen und deine Nutzung personalisieren. Sie können von uns oder von Drittanbietern, deren Dienste wir auf unseren Seiten verwenden, gesetzt werden. Wenn du diese Cookies nicht zulässt, funktionieren einige oder alle Dienste möglicherweise nicht wie vorgesehen. Cookie-Details SOCIAL-MEDIA-COOKIES Social-Media-Cookies Inaktiv Diese Cookies werden von Social-Media-Services gesetzt, die wir in unsere Website eingebunden haben, damit du unsere Inhalte mit deinen Freunden und Netzwerken teilen kannst. Diese Cookies können deinen Browser über andere Websites hinweg verfolgen und ein Profil deiner Interessen erstellen. Dies kann sich auf Inhalte und Nachrichten auswirken, die dir auf anderen Websites angezeigt werden. Wenn du diese Cookies nicht zulässt, kannst du die eingebundenen Social-Media-Services möglicherweise nicht nutzen oder sehen. Cookie-Details WERBUNGS-COOKIES Werbungs-Cookies Inaktiv Diese Cookies können von unseren Werbepartnern über unsere Website gesetzt und dazu verwendet werden, um ein Profil deiner Interessen zu erstellen und auf anderen Websites relevante Werbeanzeigen einzublenden. Sie speichern keine personenbezogenen Daten, sondern beruhen auf einer eindeutigen Identifizierung deines Browsers und Internetgeräts. Wenn du diese Cookies nicht zulässt, dann wird die angezeigte Werbung weniger auf deine Interessen zugeschnitten sein. Cookie-Details NOTWENDIGE COOKIES Immer aktiv Diese Cookies sind für die Funktion der Website unverzichtbar und können in unseren Systemen nicht deaktiviert werden. In der Regel werden diese Cookies nur als Reaktion auf von dir durchgeführte Aktionen gesetzt, mit denen ein bestimmter Service angefordert wird, wie z. B. beim Festlegen deiner Datenschutzeinstellungen, bei der Anmeldung oder beim Ausfüllen von Formularen. Du kannst in deinem Browser einstellen, dass diese Cookies blockiert werden oder dass du über diese Cookies benachrichtigt wirst, einige Bereiche der Website funktionieren dann aber nicht. Diese Cookies speichern keine personenbezogenen Daten. Cookie-Details PERFORMANCE-COOKIES Performance-Cookies Inaktiv Diese Cookies ermöglichen es uns, Website-Besuche zu zählen und Aktivitäten zu messen, damit wir die Performance unserer Website verbessern können. Anhand dieser Cookies können wir erkennen, welche Seiten besonders beliebt bzw. unbeliebt sind, und nachvollziehen, wie sich die Besucher innerhalb der Website bewegen. Wenn du diese Cookies nicht zulässt, können wir die Performance der Website nicht überwachen. Cookie-Details Back Button BACK Filter Button Consent Leg.Interest Switch Label label Switch Label label Switch Label label * View Third Party Cookies * Name cookie name Clear checkbox label label Apply Cancel Meine Auswahl bestätigen Alle ablehnen Alle zulassen KURS IN DEN EINKAUFSWAGEN LEGEN? Bestätige bitte, dass du diesen Kurs in den Einkaufswagen legen möchtest. AbbrechenIn den Einkaufswagen