• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

947 Courses delivered Online

CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam

By Packt

In this course, you will dive deep into the 5 domains of the CompTIA Pentest+ exam and learn each topic in a succinct manner. You will learn the structure of the exam and create your own pentest lab, and have the confidence to ace the exam, whenever you decide to attempt it.

CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam
Delivered Online On Demand8 hours 8 minutes
£137.99

FCA Compliance Essentials

5.0(4)

By LGCA | London Governance and Compliance Academy

Begin your journey in compliance management with practical knowledge of the laws and legislations that make up the regulatory field in the United Kingdom. Do you know that FCA sets an annual CPD requirement both for senior managers and employees of financial service firms? As per TC 2.1.15 & 2.1.16, the requirement is 35 hours in each 12 months, including 21 hours of structured CPD activities. Furthermore, TC 2.1.20G27/05/2022 defines structures CPD activities as follows: “Examples of structured continuing professional development activities include participating in courses, seminars, lectures, conferences, workshops, web-based seminars or e-learning.” Our FCA Compliance Essentials Bundle, fulfilling and even exceeding the FCA requirement in terms of CPD hours, is ideal for any professional within Financial Services. Study method Online, self-paced Course format Video with subtitles Duration 40 hours Qualification No formal qualification CPD 40 CPD hours / points Certificates Certificate of Completion - Free Description LGCA's FCA Compliance Essentials eLearning library currently includes the following courses (new courses are added on a regular basis): AML Risk Assessment AML Suspicious Activity Reports and Suspicious Transaction Reports (SAR/STRs) Anti-Bribery and Corruption Anti-Money Laundering and Counter Terrorist Finance Approved Persons Regime Assessing and Managing AML Risks Building an AML Risk-based Approach CASS Introduction Complaints Handling Compliance Introduction Compliance Monitoring and Testing Conduct Rules for All Staff Conflict of Interest (COI) Consumer Duty Establishing and Maintaining a Strong CDD Programme Ethics, Integrity and Fairness in Financial Services FCA: the Role and Approach Financial Promotions Regulation Fraud Detection and Prevention GDPR Awareness Introduction to Cybersecurity Introduction to Know Your Client (KYC) and Customer Due Diligence (CDD) Market Abuse (MAR) Operational Resilience Senior Managers and Certification Regime SM&CR – The Conduct Rules Suspicious Transactions/Activity Reporting The Value of Customer Due Diligence (CDD) Treating Customers Fairly Vulnerable Customer Management Whistleblowing Creating a Compliance Culture in Financial Services Who is this course for? Financial Services Providers Accounting Offices Financial Institutions Brokers Wealth & Fund Managers Investment Firms Insurance Companies Law Firms Compliance Consultants Payment Solutions Providers FinTech & RegTech Companies Fiduciary Services Firms

FCA Compliance Essentials
Delivered Online On Demand
£499

OTHM Level 3 Foundation Diploma in Information Technology

By School of Business and Technology London

Getting Started The OTHM Level 3 Foundation Diploma in Information Technology aims to provide learners with the competencies and understanding necessary for a career in the IT industry or to advance to higher education. This qualification is structured to ensure that every learner can cultivate industry-specific knowledge and acquire contemporary proficiencies in computer systems, networks, programming, web development, mobile communications, cybersecurity, and social media for business.The OTHM Level 3 Foundation Diploma in Information Technology aims to provide learners with the competencies and understanding necessary for a career in the IT industry or to advance to higher education. This qualification is structured to ensure that every learner can cultivate industry-specific knowledge and acquire contemporary proficiencies in computer systems, networks, programming, web development, mobile communications, cybersecurity, and social media for business. Key Benefits Understand the purpose of computer systems. Understand the purpose and types of coding. Understand networking principles Understand the uses and features of mobile communication devices. Assess the importance of cyber security for businesses. Understand the importance of using social media in a business environment. Key Highlights This qualification will offer learners the requisite skills and knowledge to enter the world of work in their chosen sector. We will ensure your access to the first-class education needed to achieve your goals and dreams and to maximise future opportunities. Remember! The Assessment for the qualification is done based on assignments only, and you do not need to worry about writing any exam With the School of Business and Technology London, you can complete the qualification at your own pace, choosing online or blended learning from the comfort of your home. Learning and pathway materials and study guides developed by our qualified tutors will be available around the clock in our cutting-edge learning management system. Most importantly, at the School of Business and Technology London, we will provide comprehensive tutor support through our dedicated support desk. If you choose your course with blended learning, you will also enjoy live sessions with an assigned tutor, which you can book at your convenience. About Awarding Body OTHM is an established and recognised Awarding Organisation (Certification Body) launched in 2003. OTHM has already made a mark in the UK and global online education scenario by creating and maintaining a user-friendly and skill based learning environment. OTHM has both local and international recognition which aids OTHM graduates to enhance their employability skills as well as allowing them to join degree and/or Master top-up programmes. OTHM qualifications has assembled a reputation for maintaining significant skills in a wide range of job roles and industries which comprises Business Studies, Leadership, Tourism and Hospitality Management, Health and Social Care, Information Technology, Accounting and Finance, Logistics and Supply Chain Management. Assessment Internally assessed by the centre and externally verified by OTHM Assignment based Assessment No exam Entry Requirements Learners must be 18 years of demonstrate the ability to undertake the learning and Assessment A learner not from a majority English-speaking country must provide evidence of English language competency. Progression Relevant undergraduate programmes OTHM Level 4 Diplomas Learners must request before enrolment to interchange unit(s) other than the preselected units shown in the SBTL website because we need to make sure the availability of learning materials for the requested unit(s). SBTL will reject an application if the learning materials for the requested interchange unit(s) are unavailable. Learners are not allowed to make any request to interchange unit(s) once enrolment is complete. UNIT1- Computer Systems Reference No : L/618/6090 Credit : 10 || TQT : 100 This unit's objective is to acquaint learners with the fundamental components of computer systems in terms of hardware and software. It further aims to enable learners to perform basic installations and configurations. The unit is designed to foster learners' comprehension of the essential constituents of computer systems and how these components can be adapted to individual needs. UNIT2- Coding and Website Development Reference No : R/618/6091 Credit : 10 || TQT : 100 The primary goal of this unit is to equip learners with an understanding of the fundamental processes involved in creating simple programs and applications, as well as the rudiments of basic website design. UNIT3- Networks Reference No : Y/618/6092 Credit : 10 || TQT : 100 This unit seeks to empower learners with the knowledge of the significance of networks in computer systems and their vital role in various applications. Learners will also acquire insights into network technologies and the delivery of a wide spectrum of networked services. UNIT4- Mobile Communications Reference No : M/618/6096 Credit : 10 || TQT : 100 The objective of this unit is to explain the evolution of mobile communication and its transformative impact on everyday life. It also aims to provide learners with an understanding of the underlying functionality that supports crucial business and e-commerce applications. UNIT5- Cyber Security Reference No : T/618/6097 Credit : 10 || TQT : 100 This unit aims to enable learners to grasp the concept of cyber security and the drawbacks and implications of inadequate cyber security measures. Learners will gain an understanding of essential terminology and the motivations of both ethical and unethical actors. Additionally, they will explore the advantages and disadvantages of implementing security by design. UNIT6- Social Media for Business Reference No : A/618/6098 Credit : 10 || TQT : 100 This unit will allow learners to explore how businesses leverage social media to promote their products and services. Learners will also be tasked with creating a social media policy and a strategic plan tailored to meet the business's specific requirements. Delivery Methods School of Business & Technology London provides various flexible delivery methods to its learners, including online learning and blended learning. Thus, learners can choose the mode of study as per their choice and convenience. The program is self-paced and accomplished through our cutting-edge Learning Management System. Learners can interact with tutors by messaging through the SBTL Support Desk Portal System to discuss the course materials, get guidance and assistance and request assessment feedbacks on assignments. We at SBTL offer outstanding support and infrastructure for both online and blended learning. We indeed pursue an innovative learning approach where traditional regular classroom-based learning is replaced by web-based learning and incredibly high support level. Learners enrolled at SBTL are allocated a dedicated tutor, whether online or blended learning, who provide learners with comprehensive guidance and support from start to finish. The significant difference between blended learning and online learning methods at SBTL is the Block Delivery of Online Live Sessions. Learners enrolled at SBTL on blended learning are offered a block delivery of online live sessions, which can be booked in advance on their convenience at additional cost. These live sessions are relevant to the learners' program of study and aim to enhance the student's comprehension of research, methodology and other essential study skills. We try to make these live sessions as communicating as possible by providing interactive activities and presentations. Resources and Support School of Business & Technology London is dedicated to offering excellent support on every step of your learning journey. School of Business & Technology London occupies a centralised tutor support desk portal. Our support team liaises with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receives a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and streamline all the support processes efficiently. Quality learning materials made by industry experts is a significant competitive edge of the School of Business & Technology London. Quality learning materials comprised of structured lecture notes, study guides, practical applications which includes real-world examples, and case studies that will enable you to apply your knowledge. Learning materials are provided in one of the three formats, such as PDF, PowerPoint, or Interactive Text Content on the learning portal. How does the Online Learning work at SBTL? We at SBTL follow a unique approach which differentiates us from other institutions. Indeed, we have taken distance education to a new phase where the support level is incredibly high.Now a days, convenience, flexibility and user-friendliness outweigh demands. Today, the transition from traditional classroom-based learning to online platforms is a significant result of these specifications. In this context, a crucial role played by online learning by leveraging the opportunities for convenience and easier access. It benefits the people who want to enhance their career, life and education in parallel streams. SBTL's simplified online learning facilitates an individual to progress towards the accomplishment of higher career growth without stress and dilemmas. How will you study online? With the School of Business & Technology London, you can study wherever you are. You finish your program with the utmost flexibility. You will be provided with comprehensive tutor support online through SBTL Support Desk portal. How will I get tutor support online? School of Business & Technology London occupies a centralised tutor support desk portal, through which our support team liaise with both tutors and learners to provide guidance, assessment feedback, and any other study support adequately and promptly. Once a learner raises a support request through the support desk portal (Be it for guidance, assessment feedback or any additional assistance), one of the support team members assign the relevant to request to an allocated tutor. As soon as the support receive a response from the allocated tutor, it will be made available to the learner in the portal. The support desk system is in place to assist the learners adequately and to streamline all the support process efficiently. Learners should expect to receive a response on queries like guidance and assistance within 1 - 2 working days. However, if the support request is for assessment feedback, learners will receive the reply with feedback as per the time frame outlined in the Assessment Feedback Policy.

OTHM Level 3 Foundation Diploma in Information Technology
Delivered Online On Demand11 months
£780.35

How to Study for CISSP®️ Certification - Tips, Materials, and Approach

By Packt

Preparing for the CISSP Certification Exam? Then this course is for you. In this course, you will learn more effective CISSP study techniques, exam hacks, formats, and strategies, as well as how to correctly respond to exam questions.

How to Study for CISSP®️ Certification - Tips, Materials, and Approach
Delivered Online On Demand2 hours 31 minutes
£56.99

Cisco Service Provider 5G Technologies Foundations v1.0 (SPMBL100)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for network and software engineers and hold job roles such as: Network administrator Network engineer Network manager System engineer Project manager Network designer Overview After taking this course, you should be able to: Describe mobile network architecture basics List enabling technologies for 5G and describe 5G key use cases Perform basic operations on a Cisco 5G NSA mobile packet core Describe the Cisco 5G Converged SDN Transport Architecture Describe Cisco NFVI and perform basic operations using Cisco ESC and Cisco Virtualized Infrastructure Manager (VIM) Describe Cisco service provider automation and orchestration solutions to deploy and manage 5G network functions Describe the Cisco Ultra Cloud Core architecture and deploy the Cisco SMI Explain the 5G ready distributed Telco DC with Cisco ACI solution Describe the Cisco 5G security architecture The Cisco Service Provider 5G Technologies Foundations (SPMBL100) v1.0 course introduces mobile network components, basic 5G concepts, and features of 5G technology including faster data speeds, higher device capacity, and improved user experience. You will examine the mobile packet core solutions, 5G transport architecture, and Cisco© automation and orchestration tools used in 5G networks. You will also learn about the Cisco 5G Non-standalone (NSA) and the Cisco Ultra Cloud Core 5G standalone (SA) platform solutions, the Cisco 5G converged Software-Defined Networking (SDN) transport architecture, and Cisco edge computing solutions. You will study the Cisco Network Function Virtualization (NFVI) architecture, Cisco Network Services Orchestrator (NSO), and Cisco Elastic Services Controller (ESC). You will learn how 5G is distributed with Telco Data Center (DC) with Cisco Application Centric Infrastructure (Cisco ACI©). And finally, Zero-Touch Provisioning (ZTP), Cisco Crosswork?, and the Cisco 5G security architecture will also be presented. Mobile Network Fundamentals 5G Key Use Cases Examining Mobile Network Components Enabling Technologies for 5G Introduction to 5G NR Characteristics Cloud Radio Access network (RAN) Cisco 5G NSA Solution 5G NSA Basics 5G NSA StarOS Configurations Cisco 5G Converged SDN Transport Architecture Cisco 5G Transport Ready Devices Application Awareness and Network Slicing with Segment Routing Cisco NFV Infrastructure, Cisco Virtualized Network Functions (VNFs), Cisco VIM, and Cisco ESC NFVI and SDN Architecture Overview Cisco VIM Pod Configurations Cisco Service Provider Automation and Orchestration Telemetry Basics ZTP Fundamentals Cisco Ultra Cloud Core Cisco Ultra Cloud Core Basics Kubernetes and Docker Fundamentals 5G Ready Distributed DC with Cisco ACI Cisco ACI in Telco Data Centers 5GC Deployment Mitigating Threats in 5G Introduction to 5G Cybersecurity Risks Mitigating 5G Cybersecurity Risks

Cisco Service Provider 5G Technologies Foundations v1.0 (SPMBL100)
Delivered OnlineFlexible Dates
Price on Enquiry

CISSP®️ Certification Domain 6 - Security Assessment and Testing Video Boot Camp for 2022

By Packt

This course helps you prepare for your CISSP certification. In this course, we will be discussing CISSP? Certification Domain 6 - Security Assessment and Testing. This course focuses on how we assess and test the security measures we have in place; this is done to ensure we are as secure as we think we are and to improve our security posture. Domain 6 makes up 12% of the exam questions.

CISSP®️ Certification Domain 6 - Security Assessment and Testing Video Boot Camp for 2022
Delivered Online On Demand1 hour 17 minutes
£74.99

Level 4 Diploma in Information Management

4.5(3)

By Studyhub UK

Step into the future with our 'Level 4 Diploma in Information Management', a beacon of guidance in the digital age. As information becomes the currency of our era, understanding how to efficiently manage, strategise, and safeguard it has never been more pivotal. From the foundational principles to the complexities of Management Information Systems, this course tailors a journey that unveils the marvels of contemporary data handling. Unlock the magic behind databases, audit processes, and the ethical concerns enveloping information - all curated meticulously for the modern learner. Learning Outcomes Understand the foundational principles of Information Management. Formulate and implement effective Information Management strategies. Gain proficiency in the workings of Management Information Systems (MIS). Acquire the skills to conduct an information systems audit. Grasp the ethical considerations and data protection measures in the realm of information. Why choose this Level 4 Diploma in Information Management course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Level 4 Diploma in Information Management Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Level 4 Diploma in Information Management course for? Aspiring data strategists keen to mould the future. Information officers aiming to upgrade their knowledge landscape. Database enthusiasts eager to dive deeper. Managers looking to enhance their organisational data systems. Ethical hackers and cybersecurity buffs aiming for a broader perspective. Career path Information Strategist - £45,000 - £70,000 Data Protection Officer - £40,000 - £60,000 MIS Analyst - £50,000 - £75,000 Systems Audit Specialist - £55,000 - £80,000 Information Management Consultant - £48,000 - £73,000 Database Administrator - £42,000 - £68,000 Prerequisites This Level 4 Diploma in Information Management does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Level 4 Diploma in Information Management was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 01: Introduction to Information Management Introduction to Information Management 00:32:00 Module 02: Information Management Strategy Information Management Strategy 00:17:00 Module 03: Databases and Information Management Databases and Information Management 00:29:00 Module 04: Management Information Systems (MIS) Management Information Systems (MIS) 00:16:00 Module 05: Auditing Information Systems Auditing Information Systems 00:16:00 Module 06: Ethical and Social Issues and Data Protection Ethical and Social Issues and Data Protection 00:27:00 Assignment Assignment - Level 4 Diploma in Information Management 00:00:00

Level 4 Diploma in Information Management
Delivered Online On Demand2 hours 17 minutes
£10.99

Software Security Testing

By Packt

Learn how to perform security audits, penetration testing, and code auditing for modern software in the web/cloud, mobile, and desktop. This course will help you master industry standards and enable you to carry out professional assessments to secure technologies as well as communicate risks to high-level executives, management, and technical staff.

Software Security Testing
Delivered Online On Demand7 hours 59 minutes
£149.99

Burp Suite Unfiltered - Go from a Beginner to Advanced

By Packt

Welcome to this course on Burp Suite that will help you progress from absolute zero to an advanced level. Together, we will explore how all the tools and tabs of the Burp Suite work and how we can use them effectively to our advantage. This complete hands-on course will help you ace Burp Suite with no prior hacking experience.

Burp Suite Unfiltered - Go from a Beginner to Advanced
Delivered Online On Demand6 hours 6 minutes
£82.99

Website Hacking From Scratch

4.5(3)

By Studyhub UK

Embark on a riveting expedition into the realm of website security with our course, 'Website Hacking From Scratch.' Delve deep into the labyrinth of potential vulnerabilities, from SQL injections to XSS vulnerabilities, equipping yourself with the prowess to identify and safeguard against digital threats. By course end, learners are not only conversant with the anatomy of website vulnerabilities but are also adept at leveraging tools like Owasp ZAP for holistic website fortification. Learning Outcomes Gain comprehensive insights into the foundation of website vulnerabilities and their exploitation. Understand and identify risks associated with file uploads, code executions, and session management. Acquire proficiency in detecting and safeguarding against SQL and XSS vulnerabilities. Master the use of automated tools, such as Owasp ZAP, in vulnerability detection. Develop strategies for effective post-exploitation management. Why choose this Website Hacking From Scratch course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Website Hacking From Scratch Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Website Hacking From Scratch course for? Aspiring cybersecurity enthusiasts eager to delve into website security. Web developers keen to fortify their sites against potential breaches. IT professionals aiming to enhance their repertoire with security expertise. Entrepreneurs looking to ensure the robustness of their online platforms. Individuals curious about ethical hacking and its applications. Career path Ethical Hacker: £25,000 - £70,000 Penetration Tester: £30,000 - £60,000 Cybersecurity Analyst: £28,000 - £55,000 IT Security Consultant: £35,000 - £75,000 Web Security Manager: £40,000 - £80,000 Information Security Officer: £45,000 - £85,000 Prerequisites This Website Hacking From Scratch does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Website Hacking From Scratch was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Course Introduction Course Introduction 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:12:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Website Hacking From Scratch 00:00:00 Assignment Assignment - Website Hacking From Scratch 00:00:00

Website Hacking From Scratch
Delivered Online On Demand9 hours 23 minutes
£10.99