• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

173 Injection courses delivered Online

Mastering Spring Framework Fundamentals

By Packt

From tackling cross-cutting project concerns with Spring to integrating Spring JDBC to work with databases, this course teaches you the essentials you need to know to confidently use the Spring framework container in the workplace.

Mastering Spring Framework Fundamentals
Delivered Online On Demand5 hours 6 minutes
£101.99

Web Hacker's Toolbox - Tools Used by Successful Hackers

By Packt

An intermediate-level training that will help you learn how hackers find SQL injections with Sqlmap, web application security testing with Google Hacking, fuzzing with Burp Suite, and exploiting race conditions with OWASP ZAP. You will learn how to use these tools in your penetration testing projects and use them to protect your web applications.

Web Hacker's Toolbox - Tools Used by Successful Hackers
Delivered Online On Demand3 hours
£149.99

The Complete Ethical Hacking Bootcamp: Beginner To Advanced

By Packt

This video course takes you through the basic and advanced concepts of penetration testing. From setting up your own virtual lab to developing brute force attacking tools using Python, you'll learn it all with the help of engaging activities.

The Complete Ethical Hacking Bootcamp: Beginner To Advanced
Delivered Online On Demand27 hours 12 minutes
£33.99

Web Application Penetration Testing Course

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Web Application Penetration Testing Course
Delivered Online On Demand19 hours 38 minutes
£25

Complete Web Application Penetration Testing & Security

5.0(10)

By Apex Learning

Overview This comprehensive course on Complete Web Application Penetration Testing & Security will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Complete Web Application Penetration Testing & Security comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Complete Web Application Penetration Testing & Security. It is available to all students, of all academic backgrounds. Requirements Our Complete Web Application Penetration Testing & Security is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 12 sections • 60 lectures • 14:18:00 total length •About The Course: 00:03:00 •Web Attack Simulation Lab: 00:12:00 •Web application technologies 101 - PDF: 00:47:00 •HTTP Protocol Basics: 00:11:00 •Encoding Schemes: 00:13:00 •Same Origin Policy - SOP: 00:06:00 •HTTP Cookies: 00:11:00 •Cross-origin resource sharing: 00:05:00 •Web application proxy - Burp suite: 00:09:00 •Fingerprinting web server: 00:05:00 •DNS Analysis - Enumerating subdomains: 00:04:00 •Metasploit for web application attacks: 00:12:00 •Web technologies analysis in real time: 00:03:00 •Outdated web application to server takeover: 00:08:00 •BruteForcing Web applications: 00:06:00 •Shodan HQ: 00:07:00 •Harvesting the data: 00:05:00 •Finding link of target with Maltego CE: 00:09:00 •Cross Site Scripting- XSS - PDF: 00:34:00 •Cross site scripting: 00:07:00 •Reflected XSS: 00:14:00 •Persistent XSS: 00:11:00 •DOM-based XSS: 00:10:00 •Website defacement through XSS: 00:09:00 •XML Documents & database: 00:14:00 •Generating XSS attack payloads: 00:13:00 •XSS in PHP, ASP & JS Code review: 00:13:00 •Cookie stealing through XSS: 00:12:00 •Advanced XSS phishing attacks: 00:08:00 •Advanced XSS with BeEF attacks: 00:10:00 •Advanced XSS attacks with Burp suite: 00:08:00 •Code Review Guide: 03:11:00 •SQL Injection attacks - PDF: 00:45:00 •Introduction to SQL Injection: 00:16:00 •Dangers of SQL Injection: 00:05:00 •Hunting for SQL Injection vulnerabilities: 00:20:00 •In-band SQL Injection attacks: 00:27:00 •Blind SQL Injection attack in-action: 00:10:00 •Exploiting SQL injection - SQLMap: 00:09:00 •Fuzzing for SQL Injection - Burp Intruder: 00:14:00 •CSRF or XSRF attack methods: 00:12:00 •Anti-CSRF Token methods: 00:15:00 •Anti-CSRF token stealing-NOT easy: 00:11:00 •Authentication bypass-hydra: 00:11:00 •HTTP Verb Tampering: 00:09:00 •HTTP parameter pollution - HPP: 00:06:00 •Authentication: 00:10:00 •Client side control bypass: 00:10:00 •LFI & RFI attacks: 00:13:00 •Unrestricted file upload - content type: 00:06:00 •Unrestricted File Upload - Extension Type: 00:06:00 •Remote code execution using Shell Uploads: 00:09:00 •XXE attacks in action: 00:14:00 •Advanced Intruder attack types: 00:23:00 •Cross window messaging: 00:02:00 •Defense in depth applied to web app: 00:02:00 •Drupagedden: 00:02:00 •Finding details with open source: 00:17:00 •Out of band XXE: 00:02:00 •Website auditing: 00:02:00

Complete Web Application Penetration Testing & Security
Delivered Online On Demand14 hours 18 minutes
£12

Offensive Hacking Unfolded - Become a Pro Pentester

By Packt

A beginner-friendly course for aspiring pentesters with 10+ hours of applied ethical hacking and security content covering core concepts such as using VMware, basics of Linux, Nmap, Metasploit, privilege escalation, known vulnerabilities, SQL injections, pivoting, cracking passwords, and much more. You need to know the basics of Linux and networking to get started.

Offensive Hacking Unfolded - Become a Pro Pentester
Delivered Online On Demand10 hours 19 minutes
£82.99

Web Application Penetration Testing Course

4.5(3)

By Studyhub UK

The 'Web Application Penetration Testing' course is a comprehensive guide to identifying and mitigating vulnerabilities within web applications. Participants will learn the techniques and methodologies used by ethical hackers to assess and secure web applications against cyber threats. Covering topics such as cross-site scripting, SQL injection, authentication attacks, and more, this course equips learners with the knowledge and skills to perform effective penetration testing and enhance web application security. Learning Outcomes Understand the fundamentals of web application penetration testing and its importance in cybersecurity. Prepare for penetration testing activities, including setting up testing environments and tools. Explore web application technologies and their potential vulnerabilities. Learn the art of information gathering and mapping applications for vulnerability assessment. Master techniques to identify and exploit cross-site scripting (XSS) vulnerabilities. Why choose this Web Application Penetration Testing Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Web Application Penetration Testing Course Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Web Application Penetration Testing Course for? Ethical hackers and cybersecurity professionals aiming to specialize in web application security. IT professionals seeking to expand their knowledge in identifying and mitigating web application vulnerabilities. Web developers interested in understanding and addressing potential security risks in their applications. Penetration testers aiming to enhance their skillset in assessing and securing web applications. Career path Penetration Tester: £25,000 - £70,000 Ethical Hacker: £30,000 - £80,000 Application Security Analyst: £35,000 - £65,000 Cybersecurity Consultant: £40,000 - £90,000 Web Security Administrator: £32,000 - £68,000 Vulnerability Assessment Analyst: £28,000 - £60,000 Prerequisites This Web Application Penetration Testing Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Web Application Penetration Testing Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Unit 01: INTRODUCTION About The Course 00:03:00 Unit 02: BE PREPARED Web Attack Simulation Lab 00:12:00 Unit 03: WEB APPLICATION TECHNOLOGIES Web application technologies 101 - PDF 01:34:00 HTTP Protocol Basics 00:11:00 Encoding Schemes 00:13:00 Same Origin Policy - SOP 00:06:00 HTTP Cookies 00:11:00 Cross-origin resource sharing 00:05:00 Web application proxy - Burp suite 00:09:00 Unit 04: INFORMATION GATHERING - MAPPING THE APPLICATIONS Fingerprinting web server 00:05:00 DNS Analysis - Enumerating subdomains 00:04:00 Metasploit for web application attacks 00:12:00 Web technologies analysis in real time 00:03:00 Outdated web application to server takeover 00:08:00 BruteForcing Web applications 00:06:00 Shodan HQ 00:07:00 Harvesting the data 00:05:00 Finding link of target with Maltego CE 00:09:00 Unit 05: CROSS-SITE SCRIPTING ATTACKS - XSS Cross Site Scripting- XSS - PDF 01:08:00 Cross site scripting 00:07:00 Reflected XSS 00:14:00 Persistent XSS 00:11:00 DOM-based XSS 00:10:00 Website defacement through XSS 00:09:00 XML Documents & database 00:14:00 Generating XSS attack payloads 00:13:00 XSS in PHP, ASP & JS Code review 00:13:00 Cookie stealing through XSS 00:12:00 Advanced XSS phishing attacks 00:08:00 Advanced XSS with BeEF attacks 00:10:00 Advanced XSS attacks with Burp suite 00:08:00 Code Review Guide 06:20:00 Unit 06: SQL INJECTION ATTACKS - EXPLOITATIONS SQL Injection attacks - PDF 01:30:00 Introduction to SQL Injection 00:16:00 Dangers of SQL Injection 00:05:00 Hunting for SQL Injection vulnerabilities 00:20:00 In-band SQL Injection attacks 00:27:00 Blind SQL Injection attack in-action 00:10:00 Exploiting SQL injection - SQLMap 00:09:00 Fuzzing for SQL Injection - Burp Intruder 00:14:00 Unit 07: CROSS SITE REQUEST FORGERY - XSRF CSRF or XSRF attack methods 00:12:00 Anti-CSRF Token methods 00:15:00 Anti-CSRF token stealing-NOT easy 00:11:00 Unit 08: AUTHENTICATION & AUTHORIZATION ATTACKS Authentication bypass-hydra 00:11:00 HTTP Verb Tampering 00:09:00 HTTP parameter pollution - HPP 00:06:00 Authentication 00:10:00 Unit 09: CLIENT SIDE SECURITY TESTING Client side control bypass 00:10:00 Unit 10: FILE RELATED VULNERABILITIES LFI & RFI attacks 00:13:00 Unrestricted file upload - content type 00:06:00 Unrestricted File Upload - Extension Type 00:06:00 Remote code execution using Shell Uploads 00:09:00 Unit 11: XML EXTERNAL ENTITY ATTACKS - XXE XML Documents & database 00:14:00 XXE attacks in action 00:14:00 Resources Advance intruder attack types 00:23:00 Finding details with open source 00:17:00 Assignment Assignment - Web Application Penetration Testing Course 00:00:00

Web Application Penetration Testing Course
Delivered Online On Demand19 hours 37 minutes
£10.99

Web Hacking Secrets - How to Hack Legally and Earn Thousands of Dollars at HackerOne

By Packt

Master web application security testing and become a successful bug hunter

Web Hacking Secrets - How to Hack Legally and Earn Thousands of Dollars at HackerOne
Delivered Online On Demand6 hours 12 minutes
£149.99

B12 and Pernicious Anaemia Training - Webinar

4.9(21)

By AB Health Group

Course Introduction Covers B12 deficiency, pernicious anaemia, diagnosis, treatment and management. It also covers signs and symptoms. Please note: this course is for health care professionals or those working in Primary Care. It is not open to Beauticians unless you are a registered healthcare professional. If in doubt- please email annie at training@anniebarr.com or phone +44 7500048222 About this event Course Introduction This course concentrates on B12 deficiency, symptoms, treatments and management. The course covers B12 deficiency, pernicious anaemia, diagnosis, treatment and management. It also covers signs and symptoms of pernicious anaemia. This course is interactive and we include case studies and discuss issues regarding diagnostic testing.  We review inclusion and exclusion criteria and identification of appropriate clients. Delegates will get the opportunity to review practice with hands on practical demonstrations of how to give injections correctly. We will cover administration techniques, where to give the injections and record keeping / documentation. We will discuss role and responsibilities and contraindications and precautions. The delegates will leave this course with an example of an individual protocol of Patient Specific Direction (PSD) and a competence based framework document to be used in practice. This course is very interactive. AIMS AND OBJECTIVES Understand the need for accountability and responsibility in relation to role development Demonstrate an understanding of safe practice Describe the signs and symptoms of pernicious anaemia Describe pernicious anaemia and its impact on patients Fully understand the principles, and practice B12 deficiency and B12 injections Understand the importance of safety issues related to giving injections Understand the law relating to role and function of the HCA and prescribing. Describe why patients require B12 injectionsBe able to correctly identify anatomical sites for injectionsDemonstrate correct administration techniquesDemonstrate how to correctly dispose of wasteDemonstrate correct infection control procedures and use of PPEDescribe when patients require referral and understand the importance of referral using correct clinical pathwaysDemonstrate an understanding of anaphylaxis and emergency proceduresUnderstand the need for correct prescribing proceduresBe able to document consultations following your organisations procedures     COURSE CONTENTS Role and responsibilities Accountability guidelines and requirements Pernicious anaemia Blood- function B12 Deficiency Risk factors/groups Causes of B12 deficiency Diagnosis and reference ranges, testing Protocols and guidelines Factors affecting B12 diagnosis and treatment Factors affecting absorption B12 injections and common side effects Could it be B12 Deficiency Supplements Side effects and management including ADR’s Contraindications and Precautions Correct Administration and techniques including practical session Injection sites Legal Issues including consent Prescribing and Patient Specific Directions What to record Storage Disposal of injections/waste Infection control Needle stick injuries Competence and supervised practice Policies and procedures Facts and Figures Setting up and running a clinic Insurance/indemnity Research/evidence base and resources Please note Anaphylaxis is not covered on this course, however we do run a separate Anaphylaxis 1hr training course, which takes place at the end of this B12 webinar. If you wish to do the 1 hr Anaphylaxis also, you should book onto BOTH courses. WHO SHOULD ATTEND? HCAs Nurses Doctors Pharmacists Anyone interested in Vitamin B12 deficiency and pernicious anaemia and those working with clients with B12 deficiency AB Health Group awards CPD points / certificate of attendance for each course. If you would prefer an accredited certificate by our accrediting body Aim Qualifications we can organise this. The charge for the certificate including postage is £30.

B12 and Pernicious Anaemia Training - Webinar
Delivered Online
£299

Ethical Hacking Hands-on Training Certification: Intermediate Level

By Study Plex

Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Course Overview Course Overview 00:05:00 Virtual Lab Build Video - Downloading ISO and OVA Files for VirtualBox 00:08:00 Video and Lab -Creating a Virtual install of Kali using VirtualBox 00:12:00 Video and lab - Create a virtual install of Metasploitable2 00:10:00 Video and Lab - Creating Windows 7 Pro Target Machine Using VirtualBox 00:07:00 Video and Lab - Creating Windows 10 Target Machine Using VirtualBox 00:08:00 Creating Windows 10 Target Machine Using VirtualBox 00:08:00 Installing the VirtualBox Extension Pack 00:02:00 NMap Installing the WebMap-Nmap Dashboard 00:12:00 Automated Recon/Enumeration Using nmapAutomator 00:10:00 Enumerating a Windows 10 Target Creating a Vulnerable Windows 10 Target 00:04:00 Reverse Shells, Privilege Escalation and Persistent Backdoors. Create a Windows Reverse Shell Using the PowerShell 00:08:00 Create a Reverse Shell Using Command Injection 00:06:00 Create a Reverse Shell Using a File Upload 00:08:00 Launch an Automated Meterpreter Session 00:13:00 Upgrade a Dumb Terminal to Fully Functional BASH Shell 00:09:00 Windows 7 Privilege Escalation Using UAC Bypass 00:05:00 Creating a Persistent Backdoor Using a Persistent Service 00:14:00 PowerShell Empire Create Virtual Install of Server 2016 Full GUI Using VirtualBox 00:12:00 00:09:00 Installing PowerShell Empire StarKiller On Kali Linux 00:05:00 Enumerating Active Directory 00:15:00 Post-Exploitation of Windows Using PowerShell Empire 00:19:00 Post Exploitation of Microsoft Windows Advanced Password Hacking with Metasploit 00:13:00 Post-Exploitation of Microsoft Windows 00:13:00 Brute Force the SMB Password on a Windows Server 00:10:00 Enumerating Active Directory Using RPCClient 00:16:00 Dumping Wi-Fi Credentials Using netsh 00:04:00 Practical Pentesting Labs Heartbleed OpenSSL Exploit Vulnerability 00:17:00 Performing an RDP Brute Force Attack 00:14:00 Exploiting Active Directory using LLMNR/NBT-NS Poisoning 00:11:00 Accessing Kali Across the WAN with NGROK 00:15:00 Pentesting with Netcat 00:12:00 Enumerate DNS Records Using DNSRecon 00:12:00 Auditing Wireless Networks Installing a Wireless Adapter in Kali 00:09:00 Hacking a Wireless Network Using Kali Linux 00:14:00 Wireless Deauthentication Attack 00:06:00 PMKID Client-less Wireless Attack Using Bettercap 00:10:00 Wireshark Overview of Wireshark 3.2 00:10:00 Wireshark Capture Options 00:07:00 Wireshark Toolbar Icons 00:03:00 Capturing Wireless Traffic Using Wireshark 00:05:00 Capturing a 3-way TCP Handshake Using Wireshark 00:05:00 Web App Penetration Testing Creating a virtual install of OWASP 00:05:00 Setting Up Burp Suite 00:09:00 Attack Web Apps with Burp Suite Using SQL Injection 00:11:00 OS Command Injection Using Commix 3.2x 00:16:00 Web Application Firewall Detection Using WAFW00F 00:04:00 Exploit Vulnerable Web Applications Using Command Injection 00:09:00 Exploit Vulnerable Web Applications Using Command Injection 00:09:00 Using Banner Grabbing to Aid in Reconnaissance 00:10:00 Anonymity - Remaining Anonymous While Pentesting Anonymize Kali Using Whonix 00:10:00 CTF - SQL Injection to Shell Walkthrough Lab Preparation for CTF SQL Injection to Shell 00:04:00 CTF Walkthrough for SQL Injection to Shell 00:13:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Ethical Hacking Hands-on Training Certification: Intermediate Level
Delivered Online On Demand
£19