Companies Home Search Profile

Web Application Penetration Testing

Focused View

Sherif Salah-EL-Din Nour-EL-Din

33:59

17 View
  • 1 - Course Outlines.mp4
    03:07
  • 2 - Installing Kali using ISO File.txt
  • 2 - Part One Setup Home Virtual Lab.mp4
    01:46
  • 2 - Setup Home Virtual Lab.txt
  • 3 - Part 3 Penetration Testing Phases.mp4
    03:05
  • 4 - Part 4 Demonstrating Cyber Attacks.mp4
    14:58
  • 5 - All about NMAP.txt
  • 5 - Part 5 Demonstrating Penetration Testing Tools.mp4
    11:03
  • Description


    Learning web penetration testing from zero to hero.

    What You'll Learn?


    • Cover various techniques and methodologies to identify and exploit vulnerabilities in web applications.
    • Gain valuable insights and practical knowledge that will assist you in securing web applications and protecting them from potential attacks.
    • Cover most common penetration testing tools and practice its usage and features.
    • Demonstrate various web attacks and how to protect your web application or website.

    Who is this for?


  • If you’re interested in Penetration Testing and Ethical Hacking.
  • If you are interested in learning about the industry-standard tool for penetration and security testing.
  • If you are interested to learn more about various techniques and methodologies to identify and exploit vulnerabilities in web applications.
  • If you are interested in gaining valuable insights and practical knowledge that will assist you in securing web applications and protecting them from potential attacks.
  • If you are interested in learning more about various web attacks and how to protect your web application or website.
  • What You Need to Know?


  • It's recommended to have basic knowledge in Networking and Web Development Language (HTML- CSS - JavaScript - SQL - PHP).
  • More details


    Description

    This course is divided into five parts, the first part we will learn about how to create your own home virtual lab. It’s strongly recommended to test your knowledge on a testing lab and not production systems, to avoid any damage that may affect the production systems.

    We will learn how to install Kali Linux, which is the operating system we are going to use during our web application penetration testing tutorials, as Kali Linux is a tool kit that includes more than 300 penetration testing tools.


    Kali Linux can be installed using an ISO file, or using a pre-built disk image. We are going to learn both ways of installing Kali. After that, we will learn more about the vulnerable web application we are going to use, “Damn Vulnerable Web Application” or DVWA. This is a vulnerable web application as the name suggests that you can use to learn about various attacks and the correct usage of different penetration testing tools like Burp Suite, SQLMAP, etc.


    Next, in the second part of this tutorial, we will discuss the phases of any penetration testing process conducted on any web application or website. We will learn all about penetration testing and what are the techniques and tools that are used during penetration testing. I will give you the best practices in penetration testing and advise you about different standards such as NIST and frameworks such as MITRE Attack Framework, and that will guide you much during your penetration testing.

    In the third part, we are going to have an overview of Kali Linux Penetration Testing Tools. How these tools are categorized and how to use the most common tools in your penetration testing journey.

    In the fourth part of this tutorial, we are going to discuss various attacks that you must test in any web application you are testing, including file inclusion attacks, SQL injection attacks, Command execution attacks, etc.

    In the final part of this tutorial, we are going to cover the most common tools we use in our penetration testing journey as shown in the table on the right.

    That being said, we will cover various techniques and methodologies to identify and exploit vulnerabilities in web applications.


    I hope you will gain valuable insights and practical knowledge that will assist you in securing web applications and protecting them from potential attacks.

    Looking forward to hearing from you if you have any comments. Thanks.

    Who this course is for:

    • If you’re interested in Penetration Testing and Ethical Hacking.
    • If you are interested in learning about the industry-standard tool for penetration and security testing.
    • If you are interested to learn more about various techniques and methodologies to identify and exploit vulnerabilities in web applications.
    • If you are interested in gaining valuable insights and practical knowledge that will assist you in securing web applications and protecting them from potential attacks.
    • If you are interested in learning more about various web attacks and how to protect your web application or website.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Sherif Salah-EL-Din Nour-EL-Din
    Sherif Salah-EL-Din Nour-EL-Din
    Instructor's Courses
    I've a Bachelor Managerial Information System in 2005.I got a master degree in Information Security in 2020.Then I became Microsoft Certified Professional, Microsoft Certified Desktop Support Technician and Microsoft Certified System Administrator since 2009.Finally, I got varies Certifications in Information Security to became:  Certified Ethical Hacker  Professional Penetration Tester Offensive Security Certified Professional ISO 27001 Information Security Management SystemsI've successfully completed WP-Elevation Blueprint Course for WordPress Consultants.I've a +14 years of experience in the Information Technology domain who worked for many international companies and currently I'm an information security professional freelancer and Tutor for Hacking/Ethical Hacking, Android Penetration Testing, Web App Penetration Testing.Skills:Vulnerability Assessment | PythonBash Scripting | Basic C++CTF Player | Penetration TestingNetworking | OSINT AnalystTools Experience: Burp Suite NmapMaltego Wireshark  MetasploitWeb/Mobile/Network Penetration Testing.Microsoft Products SupportWeb Development Programming Languages.AWS, WordPress and Cloud Security.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 5
    • duration 33:59
    • Release Date 2023/12/16

    Courses related to Penetration Testing