By Rob Percival's Codestars, Instructor and founder of Codestars
The Complete Web Penetration Testing & Bug Bounty Course
Course description
Welcome to The Complete Web Penetration Testing & Bug Bounty Course
In this course, we are going to start from scratch and learn how to find vulnerabilities & bugs in Websites and Web Applications. Of course, we will learn this to notify the related authorities to make the internet a safer place and start making money out of this process. We are going to learn how hackers find vulnerabilities, how hackers do their attacks, and also how to protect ourselves against these attacks and submit these bugs to the related developers. We will never neglect theory but we will do hands-on experience practices all the time during the course. You will be hacking into vulnerable systems throughout the course. This training is brought to you by Codestars by Rob Percival (+1.000.000 students) and Atil Samancioglu (+200.000 students). Atil teaches cybersecurity & programming for more than 5 years and he also teaches mobile development at Bogazici University. If you are looking forward to being a part of the cybersecurity environment then you found the right course and right instructor!
What you'll learn:
- Web Application & Website Penetration Tests
- Burpsuite
- Bug Bounty
- Cyber Security Fundamentals
- Kali Linux
- Web Security
You can see some of the topics that we are going to cover throughout the course below:
Web Application Pentesting Burpsuite Kali Linux HTML bWapp Juice Shop Owasp Top 10 Mutillidae DVWA XSS XXE SQL Injection HTML Injection PHP Injection Shell Methods File Vulnerabilities Nikto Commix Dotdotpwn Wafw00f Directory Traversal Brute Force Bug Bounty
Content
This training is perfect for people who want to be an Ethical Hacker and a Bug Bounty Hunter. We are going to start from scratch and make our way up to all details. We are going to cover Kali Linux, Burpsuite, HTML, XSS, SQL, PHP Injection and so much more. All curriculum is designed to make you comfortable during the process.
Warning:
This course aims to teach people how to become ethical hackers and cybersecurity specialists. All students must use the related information within legal boundaries as mentioned in the course to make the internet a safer place.
Who this course is for:
- People who want to learn about Web Pentesting; - People who want to learn making totally legal money in cybersecurity; - People who want to learn about Burpsuite.
Related Skills
Course overview - 17
Section1: Introduction
Section 2: Kali Linux Setup
Section 3: HTML Crash Course
Section 4: HTML Injection
Section 5: PHP Injection
Section 6: Command Execution & SSI
Section 7: Directory Traversal
Section 8: XSS
Section 9: CSRF
Section 10: Brute Force
Section 11: SQL Crash Course
Section 12: SQL Injection Introduction
Section 13: SQLi GET Request
Section 14: SQLi Advanced
Section 15: Juice Shop
Section 16: Information Gathering
Section 17: Making Legal Money
Learners who have already enrolled in this course
Meet your instructor
Course by this author
- Rob Percival's CodestarsThe Complete iOS 14 / iOS 13 Developer Course - and SwiftUI!37h 10m of content$19.99