learn.ituniversity.ro
Open in
urlscan Pro
2606:4700:3037::6815:5705
Public Scan
Submitted URL: https://learn.ituniversity.ro/courses/enrolled/467336
Effective URL: https://learn.ituniversity.ro/p/bitninja-security
Submission: On December 21 via api from US — Scanned from US
Effective URL: https://learn.ituniversity.ro/p/bitninja-security
Submission: On December 21 via api from US — Scanned from US
Form analysis
2 forms found in the DOMGET /purchase
<form accept-charset="UTF-8" action="/purchase" class="sale_default" id="sale_default2" method="get">
<input type="hidden" name="authenticity_token" value="YTa5NwQZuYkxEfca0yKig9rf8w7ND0PhIGzrlfUElmoktIAhswvFLtsdq5czIg7AMEgPO0JQbkvbixC4JcMGaw==">
<input type="hidden" name="utf8" value="✓">
<input type="hidden" name="course_id" value="467336" id="course_id">
<input type="hidden" name="coupon_code" value="" id="coupon_code">
<input type="hidden" name="school_domain" value="https://ituniversity.teachable.com" id="school_domain">
<input type="hidden" name="product_id" value="1304980" id="product_id">
<input type="hidden" name="user_src" value="" id="user_src">
<button name="button" type="submit" id="enroll-button-top" data-course-id="467336" data-disable-with="Processing..." class="btn btn-hg btn-primary btn-header-enroll">
<i class="fa fa-shopping-cart"></i> Enroll in Course for <span class="default-product-price product_1304980">$99</span>
<span class="coupon-price product_1304980"></span>
</button>
</form>
GET https://ituniversity.teachable.com/purchase
<form action="https://ituniversity.teachable.com/purchase" class="new_sale" id="new_sale" method="get">
<input type="hidden" name="utf8" value="✓">
<input type="hidden" name="course_id" value="467336" id="course_id">
<input type="hidden" name="coupon_code" value="" id="coupon_code">
<input type="hidden" name="referring_page_id" value="2332212" id="referring_page_id">
<input type="hidden" name="user_src" value="" id="user_src">
<div class="col-sm-12 product-list hidden" data-toggle="buttons">
<label class="btn checkout-button-group product_1304980 active">
<div class="col-sm-1 product-radio"><input type="radio" name="product_id" id="product_id_1304980" value="1304980" checked="">
<div class="custom-radio">
<div class="selected"> </div>
</div>
</div>
<div class="col-sm-7 product-details">
<h3 class="product-name"> USD PAID <span class="discount product_1304980 hidden">
<span class="coupon-discount"></span> Coupon Discount </span>
</h3>
<p class="description">
<br>
</p>
<div class="detailed-description">
</div>
<span htmlfor="1304980" class="bnpl_installments_text product_1304980 hidden">or pay in installments:</span>
<div htmlfor="1304980" id="payment-method-messaging-element" class="hidden product_1304980"></div>
</div>
<div class="col-sm-4 product-price">
<span class="default-product-price product_1304980">$99</span> <!-- <p class="tax-disclaimer"></p>-->
<!-- <p class="tax-disclaimer"></p>-->
<span class="coupon-price product_1304980"></span>
<br>
<div class="badge-tooltip product_1304980 hidden">
<span class="cap_badge_text coupon_cap_badge_text"></span>
<span class="tooltip-text"></span>
</div>
<br>
</div>
</label>
</div>
<div class="row">
<center>
<br>
<button name="commit" type="submit" id="enroll-button" data-course-id="467336" data-disable-with="Processing..." class="btn btn-hg btn-primary btn-enroll" value="Enroll in Course for $99">
<i class="fa fa-shopping-cart"></i> Enroll in Course for <span class="default-product-price product_1304980">$99</span>
<span class="coupon-price product_1304980"></span>
</button> <br>
</center>
</div>
</form>
Text Content
Toggle navigation * All Products * Blog * Become Affiliate * Login * Sign Up LEARN SERVER SECURITY WITH BITNINJA FULL-STACK SERVER SECURITY IN ONE EASY-TO-USE PROTECTION SUITE - ENJOY REAL-TIME PROTECTION, AUTOMATIC FALSE POSITIVE HANDLING AND THREAT ANALYSIS Watch Promo Enroll in Course for $99 × off original price! The coupon code you entered is expired or invalid, but the course is still available! There are a lot of courses out here about offensive security and penetration testing. They are extremely useful. But even if you are a penetration tester, security consultant, a linux administrator or a developer, you should also have to know how to fix your security. How to protect actively (so in real time) and reactively your linux servers. And this is not an easy task, believe me, I hack websites and servers for living. And at the end of the audit, I have to give a report about how I did it and how to protect against attacks like mine. So wouldn't be easy if you would really on an actively working Web Application Firewall, Firewall and Intrusion Prevention System. To have an all in one product easily manageable, that would know the attacks and prevent them from being successful? This course is all about this. It is about protecting your server. You will witness different attacks and you will see a product like this in action. This product is called BitNinja and it is an All in one security for Linux Servers. So you can see the attacks but also you will see how to protect against them. It's very important to know that BitNinja is a commercial, subscription-based product. Hovewer, for this training, you will have an extended free trial so you can test it in your lab environment or even in production. This is a hands-on training based on demos. So a basic knowledge of Linux would be very useful. Interested in learning more about the product? Feel free to browse https://bitninja.io So what are the topics we will discuss about: * We will start with an overview of a Wordpress Attack. We will scann a website hosted on Wordpress and exploit its vulnerabilities. Furthermore we will upload a backdoor so we can have remote access to the target server. * Then we will dig in Bitninja. We will begin by installing and registering the product and see it's main features. We will talk then about proactive protection mechanisms such as IP Reputation, Port Honeypots, Web Honeypots, DoS Detection and WAF Modules. * We will continue with reactive protection mechanisms such as Malware Detection, Outbound WAF and we will see bitninja-cli capabilities. * Furthermore, we will find sources of an infection and spamming and source of outbound attacks. * In the end we will learn about troubleshooting and how to find a trouble maker IP. I think you will enjoy all of this. How BitNinja Works * Easy setup- Enjoy immediate protection on your server. BitNinja is designed to install and work with as little human interaction as possible. Run one line of code and your server is protected from 99% of attacks. * All-in-one protection- BitNinja combines the most powerful server security software in one easy-to-use protection suite. You get full-stack protection against XSS, DDoS, malware, scans, script injection, enumeration, brute force and other automated attacks — on all major protocols, not only HTTP(S). * Machine learning- Servers protected by BitNinja learn from each attack and inform each other about malicious IPs. This result is a global defense network that counteracts botnet attacks with a shield of protection for all servers running BitNinja, while also reducing the number of false positives each server encounters. YOUR INSTRUCTOR Gabriel Avramescu Senior Information Security Consultant * I work in the Internet security team, focused on ethical hacking - deliberately and purposefully challenging the IT security assumptions, strategies, and methods of protecting vital assets and information by emulating an adversary. * Scan and exploit for a wide variety of data center infrastructure and application vulnerabilities, following defined rules of engagement and attack scenarios (ethical hacking). * Make recommendations on security weaknesses and report on activities and findings. * Perform Internet penetration testing (black box / white box testing) and code reviews (manual and automated) * Use testing tools as NetBIOS scanning, network pinging and testing, packet crafting and analyzing, port scanning for vulnerability assessment * Perform analysis and testing to verify the strengths and weaknesses of Web Applications and Web Services (SML, SOAP, WSDL, UDDI, etc.) * Perform analysis and testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures * Assist with the development of remediation services for identified findings * Customize, operate, audit, and maintain security related tools and applications IT Trainer * CEH, ECSA, CHFI from EC-Council * Cisco CCNA, CCNA Security, Linux Essentials * Various Custom Trainings Certifications * OSWE * OSCE * OSWP * CREST Registered Penetration Tester (CRT) * OSCP * CHFI (Computer Hacking Forensic Investigator) * ISO 270001 Lead Auditor * ECSA (EC-Council Security Analyst) * CEH (Certified Ethical Hacker) * CCNA and CCNA Security * CCNP Routing and CCNP Switching * Advanced Linux&InfoSEC * VMWare vSphere Install, Configure, Manage * Microsoft Certified Technology Specialist (MCTS/MCP 70-642): Microsoft Windows Server 2008 Network Infrastructure, etc. COURSE CURRICULUM Introduction Available in days days after you enroll * Preview Promo Video (2:00) * Preview Let's meet (5:30) * Start Lab Setup (1:46) * Start Lab Setup - Login Information and Download Links Overview of a Wordpress attack Available in days days after you enroll * Start Commands to be used in the next section * Start Scanning for wordpress vulnerabilities (10:26) * Start Exploiting a remote code execution vulnerability (9:18) * Preview Uploading a backdoor * Start Sending spam (17:20) Basics Available in days days after you enroll * Start Registration and Installation - Useful Information * Start Registration and installation (8:51) * Start IP Reputations. IP lists - User vs Global lists. Greylisting, Blacklists, Whitelist (16:57) * Start HTTP CAPTCHA (8:35) * Start SMTP CAPTHCA (4:27) * Start Commands used in SSLTerminating Lecture * Start SslTerminating Module (32:12) * Start SslTerminating Module - Adding Certs Manually (5:00) Proactive protection mechanisms Available in days days after you enroll * Start Commands to be used in this section * Start Port Honeypots (7:57) * Start Web Honeypots (10:11) * Start DoS Detection and Protection (10:53) * Start Log Analysis (3:17) * Start WAF - Web Application Firewall (20:33) * Start Demo - Log Analysis and WAF (8:29) Reactive protection mechanisms Available in days days after you enroll * Start Malware Detection (6:57) * Start Outbound WAF (2:04) * Start Demo - Malware Detection and Outbound WAF (11:33) * Start Blacklist/Whitelist and Country level blacklist/whitelist (11:35) * Start bitninja-cli (7:42) The "How To" Section Available in days days after you enroll * Start How to find the source of an infection (9:41) * Start How to find the source of spamming (16:38) * Start How to find the source of outbound attacks (10:56) * Start Security daily routine (4:58) * Start Attack trend analysis (4:55) Troubleshooting Available in days days after you enroll * Start CDN integrations (4:23) * Start Finding a trouble-maker IP (9:34) * Start Further Reading FREQUENTLY ASKED QUESTIONS When does the course start and finish? The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish. How long do I have access to the course? How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own. off original price! The coupon code you entered is expired or invalid, but the course is still available! GET STARTED NOW! USD PAID COUPON DISCOUNT or pay in installments: $99 Enroll in Course for $99 © ituniversity.ro 2024 * Terms of Use * Privacy Policy * ITUniversity.RO * Become Affiliate * Cyber Security Awareness Completed Incomplete Incomplete disabled Completed Incomplete Incomplete disabled