Certified Website Security Expert

Between 2014 and 2015 the largest companies not just in United States but the world have been hacked. Companies like Target, Home Depot, Experian, Alliance Health of South Jordan, Blue Cross Blue Shield of Nebraska, VTech, Comcast of Pomona California, the White House, Democratic National Committee, and not including the numerous federal government agencies that were hacked.

These companies or government websites were able to be hacked, because they had website developers design their websites who did not have security in mind.

You will learn in this course how to use the same tools that hackers use to find all the different ways to hack into a website.

 

Course Curriculum

Getting Started In Website Security
 
Course Discussion
Example Of Laws About Hacking
Did You Know….
Getting Started In Website Security
The Most Popular Websites
How Hackers and Web Developers Make Money
Linux Is A Must
Example of Using Linux
Computer Security Dictionary
Installing The Tools
About Burp Suite For Web Applications
Download Burp Suite Mac OS
Download Burp Suite For Windows
Burp Suite For Web Application
Setting Up A Proxy
Configuring HTTPS And Firefox
Burp Suite for Web Application – Payload Configuration
About Kali
Kali Linux Installation on Flash Drive
Kali Linux Installation in VirtualBox
Reconnaissance
Mapping A Website Using Sitemap
How To Use A Web Spider
How to Use “Who Is”
How To Use Google To Hack
Google Hacking Database
What Is Skipfish
Using Skipfish Video Part 1
Using Skipfish Video Part 2
Project 1 – Reconnaissance
Vulnerbility Scanning
Active and Passive Scans
Setting Up Your Scanner Options
Overview Of Scan Types
Evasion Of A IDS And Firewall
Packet Crafting
How To Craft A Packet
Overview Of Vulnerability Scanning
Using Nessus For Scanning
Nmap Program for Windows
Introduction to Nmap Video
Project 2 – Vulnerbility Scanning
Overview of Skipfish, Part 1
Overview of Skipfish, Part 2
Overview of WordPressScan, Part 1
Overview of WordPressScan, Part 2
Hacking – Password Security
Hacking – Website Password – Part 1
Hacking – Website Password – Part 2
Hacking – Website Password – Part 3
Project 3 – Password Security
Hacking – Cross-Site Scripting (XSS)
Introduction To Cross-Site Scripting
Cross-Site Scripting (XSS) – Example
Cross-Site Forgery Attacks
Introduction to Cross-Site Request Forgery (XSRF)
Introduction to Cross-Site Request Forgery
Hacking – SQL Injection
What is SQL Injection
SQL Injection In Detail
Project 4 – SQL Injection
Hacking – Buffer Overflow
Introduction To Buffer Overflow
Buffer Overflow – Example
How To Exploit A Buffer Overflow Vulnerability In Detail
Project 5 – Buffer Overflow
Hacking Website – Bring It All Together
Web Applications
Download Burp Suite Mac OS
Introduction to Website Hacking
Setting Up Proxy
Setting Up The Payload
Mapping Manually And Scope
Spiders
Active and Passive Scans
Setting Up Scanner Options
Password Security
Download Burp Suite Mac OS
Download Burp Suite Mac OS
Download Burp Suite Mac OS
Intruder
Download Burp Suite Mac OS
Download Burp Suite Mac OS
Intruder Attack
Conclusion
Final Project

Source:http://www.nationalcybersecurityuniversity.net/courses/vulnerability-scanning