Stone River Elearning – Ethical Hacking: Hacking Applications

15.00 $

This course is available after purchase you will immediately receive a download link for lifetime.

Description

Stone River Elearning – Ethical Hacking: Hacking Applications

Understanding and securing modern application architecture

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX.

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.

Course Curriculum

Hacking Applications
  • Application Architecture and Security (7:56)
  • Hamster and Ferret (5:56)
  • Morpheus (4:22)
  • Heap Spraying Demonstration (4:30)
  • OWASP Zed Attack Proxy (12:13)
  • Persistent XSS Demo (1:53)
  • Buffer Overflow Demonstration (4:36)
  • Buffer Overflows Explained (23:18)
  • Hacking AJAX (9:25)

> Please contact our team if you have questions, or broken links via our email [email protected].