Ethical hacking For Security Researcher Premium class

Irtiza Ali

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
26 Videos (2h 52m)
    • Introduction

      1:43
    • Overview

      2:33
    • Acuitix

      3:31
    • Dom xss final

      6:34
    • Google dork 2 sql

      5:28
    • Lab setup

      3:46
    • Last xss

      10:45
    • Netsparker

      6:22
    • Non persistent xss 2

      16:26
    • Sql Injection 1

      7:23
    • Concept and misconception

      3:09
    • Why xss and types

      3:47
    • Motivation

      4:27
    • Kali linux 7

      9:19
    • How to install kali linux on vmware

      5:38
    • How to install web for pentester lab

      5:03
    • Kali linux 1

      8:06
    • Kali linux 2

      4:35
    • Kali linux 3

      7:16
    • Kali linux 4

      7:59
    • Kali linux 5

      12:14
    • Kali linux 6

      7:35
    • Firefox addon 1

      5:59
    • Addon 2

      10:40
    • Google Dorks

      5:07
    • 1st xss

      6:08

About This Class

This Course is about :

  1. What is xss?
  2. Why xss?
  3. Types of xss?
  4. What are the different sources of xss?
  5. Different context of xss?
  6. What is Sql Injection?
  7. Different Types of Sql injection.

Types of xss

  1. Persistent xss (stored xss)
  2. Non persistent xss reflected xss
  3. Dom based xss
  • We will discuss different xss example according owasp xss.
  • Why xss is so important?
  • What is internet safety?
  • What is network security?

COURSE REQUIREMENTS:

  1. Nothing just know to run apps on computer
  2. HTTP client server Architecture
  3. Basics of HTML and JS.
  4. Basics of PHP and ASPnet

If you know about some of these things then it will be more beneficial and will be easy for your understanding this course.

WHO SHOULD ATTEND?

  1. Security Researcher
  2. Web Developer
  3. Bug Hunter
  4. Hard Worker and If you want to make yourself do somethig

25

Students

--

Projects

0

Reviews (0)