• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1426 Network & Security courses in Sheerness delivered Online

Advanced Asterisk for Engineers

5.0(3)

By Systems & Network Training

Advanced Asterisk training course description This 2 day hands-on Asterisk training course covers advanced Asterisk configuration including fault tolerant clusters, upgrading and patching Asterisk servers, firewall and NAT transversal, using databases to store Asterisk data. Practical sessions follow each major section to reinforce the theory. What will you learn Configure advanced Asterisk features. Utilise databases from Asterisk Integrate Asterisk with SIP servers. Build High Availability Asterisk clusters. Maintain and secure Asterisk servers. Advanced Asterisk training course details Who will benefit: Technical staff working with or evaluating Asterisk. Prerequisites: Definitive Asterisk for engineers Duration 2 days Advanced Asterisk training course contents Best Practice Review of basics, Channel best practice, dial plan best practise. Call Centre Features GUI, Asterisk Manager Interface, billing, CDR, advanced IVR, ACD, Vici Dial. Hands on Install Vici-Dial Asterisk and Databases MySQL, LDAP, ODBC, dial plan from a Database, storing CDR in a Database, Hands on Dial plan in MySQL, CDR in MySQL. TDM over Ethernet What is TDMoE, Asterisk to Asterisk TDMoE, Phone Bridge. Hands on * 2 * via TDMoE. High Availability Asterisk HA Linux - Virtual Servers, Fail-over steps, setting up HA Linux, configuring Asterisk for fail-over on HA Linux, Hands on Configure Asterisk HA. Advanced Dial plans Asterisk Gateway Interface, AGI IVR applications, Multiple switches sharing Dial plans, ENUM, DUNDI. Hands on Configure DUNDI. Integration Legacy PBX, SIP Proxys, OpenSER. Hands on Configure SER to work with Asterisk. Asterisk Maintenance Asterisk upgrades, implementing patches, advanced debugging, Security Firewalls, NAT, Asterisk security issues. Hands on Configure Asterisk to work through a Firewall and NAT.

Advanced Asterisk for Engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

IP in mobile networks

5.0(3)

By Systems & Network Training

Mobile IP training course description A detailed examination of the protocols and architecture of Mobile IP. What will you learn Recognise the benefits of ADSL. Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. Mobile IP course details Who will benefit: Technical staff wanting to learn DNS.Network Administrators. Support personnel. Prerequisites: TCP/IP Foundation Duration 2 days Mobile IP course contents Introduction Quick review of IP, What is Mobile IP? What Mobile IP provides, Mobility requirements, Where Mobile IP is required, where mobile IP is not required, DHCP as an alternative, Proxy ARP as an alternative. Architecture Mobile node, home network, home agent, Foreign agent, Fixed home address, Care of address, Correspondent node, Tunnelling. How Mobile IP works Using two addresses, issues with TCP, discovering the care of address, registering care of address, tunnelling the care of address. The protocols involved. Issues with Mobile IP Routing inefficiencies, Security and firewalls, ingress filtering, QoS. MIP and IPv6 Stateless address configuration, Neighbour discovery, miscellaneous.

IP in mobile networks
Delivered in Internationally or OnlineFlexible Dates
£2,477

XSLT training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Transform and style XML documents using XSLT. XSLT training course details Who will benefit: Anyone working with XSLT. Prerequisites: XML primer Duration 2 days XSLT training course contents Introduction Extensible Stylesheet Language (XSL), transforming and formatting XML. XML refresher The basic rules for building an XML document. An introduction to XSLT The basic concepts of XSLT, xsl:output, xsl:template, xsl:value-of. XML documents as trees How the original XML is transformed into a set of nodes, the general terms for manipulating node trees. Paths (XPath) Use of path matching to select required nodes for transformation. Using templates xsl:apply-templates, xsl:template match, nested templates, xsl:copy , <comment> and <element> , default templates, parameters. Control xsl:if, xsl:choose, xsl:for-each, xsl:sort. Constructing the result tree xsl:output, xsl:attribute, xsl:attribute-set, xsl:comment, xsl:processing-instruction, xsl:text, xsl:value-of, xsl:variable. Combining templates xsl:include, xsl:import, xsl:apply-imports. Transforming to text

XSLT
Delivered in Internationally or OnlineFlexible Dates
£2,477

Complete ADO.NET for developers

5.0(3)

By Systems & Network Training

ADO.NET training course description This ADO.net training course is designed to enable developers to use the toolset provided with.NET for data access including ADO.net objects, data controls, designers and interoperability with earlier ADO objects. The course is applicable for those using C# or VB.NET with ADO.NET What will you learn Retrieve and manipulate data using Microsoft's ADO.NET library. Work with the ADO.NET object model. Update data, including handling stored procedures, parameters, and return value. Search, sort and filter data. Leverage the power of XML. ADO.NET training course details Who will benefit: Programmers working with ADO.Net. Prerequisites: Effective programming with VB.NET or Concise introduction to C# Duration 2 days ADO.NET training course contents Introducing ADO.Net Traditional Data Access Architecture. ADO.Net Disconnected Data Access Architecture. Different components of ADO.Net. A review of basic SQL queries SQL SELECT Statement. SQL INSERT Statement. SQL UPDATE Statement. SQL DELETE Statement. Common data access tasks with ADO.Net Accessing Data using ADO.Net. Defining the connection string. Defining a Connection. Defining the command or command string. Defining the Data Adapter. Creating and filling the DataSet. A Demonstration Application The Interface. Loading the table. Filling the controls on the Form. Navigating through the records. Updating Data Steps for updating the table. Building the Application. Loading the table and displaying data in the form's controls. Initialising Commands. Adding Parameters to the commands. The ToggleControls() method of our application. Editing (or Updating) Records. Event Handler for the Save Button. Event Handler for the Cancel Button. Inserting Records. Deleting a Record. Using Stored Procedures Sample Stored Procedures. UPDATE Stored Procedure. INSERT Stored Procedure. DELETE Stored Procedure. SELECT Stored Procedure. Using Stored Procedures with ADO.Net.

Complete ADO.NET for developers
Delivered in Internationally or OnlineFlexible Dates
£2,477

CompTIA Security+ Certification SY0-601: The Total Course

By Packt

This video course is designed to prepare you to achieve the internationally recognized fundamental IT training certification, CompTIA Security+ Certification SY0-601 exam. The course covers all the major domains needed for the certification and will help you develop the basics of IT and computers with the help of examples and quizzes.

CompTIA Security+ Certification SY0-601: The Total Course
Delivered Online On Demand19 hours 38 minutes
£59.99

Certified Ethical Hacking - Complete Video Training

4.3(43)

By John Academy

Description: Hacking becomes very common nowadays. If it comes about the company information, it is one of the most dangerous problems. An ethical hacker helps an organisation to protect their data and increases the security of a computer system. Therefore, the demand for a certified ethical hacker is increasing day by day. The Certified Ethical Hacking - Complete Video Training course will help to meet your need if you want to build a stable career in ethical hacking. The course is taught in two parts. One part deals with the basic knowledge of ethical hacking and helps you to be an ethical hacker while the second section prepares you for the Certified Professional Ethical Hacker (CPEH). The bundle video course teaches the fundamental concepts of ethical hacking including access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, reconnaissance, covering tracks, malware, buffer overflows, and password cracking, etc. You will also learn to implement the counter-response to protecting your information. In short, the Certified Ethical Hacking - Complete Video Training provides a complete guide to ethical hacking. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Ethical Hacking - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Ethical Hacking - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview Overview FREE 00:35:00 Reconnaissance Reconnaissance 00:25:00 Protocols Protocols 01:25:00 Windows Hacking Windows Hacking 01:19:00 Attacking Web Technologies Attacking Web Technologies 00:56:00 Pen Testing Wireless Networks Pen Testing Wireless Networks 01:34:00 Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Final Exam Final Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Order Your Certificates and TranscriptsOrder Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00

Certified Ethical Hacking - Complete Video Training
Delivered Online On Demand14 hours 5 minutes
£11.99

Digital Forensics for Cyber Professionals

4.9(27)

By Apex Learning

Overview This comprehensive course on Digital Forensics for Cyber Professionals will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Digital Forensics for Cyber Professionals comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Digital Forensics for Cyber Professionals. It is available to all students, of all academic backgrounds. Requirements Our Digital Forensics for Cyber Professionals is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 11 sections • 35 lectures • 05:37:00 total length •Course Overview: 00:06:00 •Lab - Installing CSI Linux: 00:13:00 •Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox: 00:06:00 •Lab - Create a Virtual Install Kali Image Using VirtualBox: 00:07:00 •Lab - Create Virtual Install of Windows 10 Using VirtualBox: 00:08:00 •Install Additional Tool Using Katoolin3: 00:10:00 •Lab - Simulate Creating a Disk Image for a Forensic Analysis: 00:11:00 •Lab - Examining a forensic Disk Image Using Autopsy: 00:12:00 •Lab -Digital Forensics Using Autopsy Part I: 00:11:00 •Lab - Digital Forensics Using Autopsy Part II: 00:07:00 •Lab - Installing the WebMap-Nmap Dashboard: 00:12:00 •Lab - Conducting OSINT Using CSI Linux Investigator: 00:08:00 •Lab - Find Social Media Accounts Using Sherlock: 00:07:00 •Attaching an External USB Device in Kali: 00:07:00 •Lab - Memory Forensics Using the Volatility Framework: 00:18:00 •Lab - Acquiring a Forensic Copy of the Windows Registry: 00:15:00 •Lab - Analyzing the Windows Registry for Evidence: 00:14:00 •Lab - Preparing CSI Investigator to Use Shodan: 00:05:00 •Lab - Using Shodan to Find Vulnerable Devices: 00:14:00 •Lab - Using Shodan to Search for Vulnerable Databases: 00:08:00 •Lab - Using the EXIFtool to Read and Write EXIF Tags: 00:11:00 •Using the EXIFtool to Read and Write EXIF Tags: 00:10:00 •Overview of Wireshark 3.2: 00:11:00 •Wireshark Capture Options: 00:07:00 •Wireshark Toolbar Icons: 00:04:00 •Lab - Capturing a 3-way TCP Handshake Using Wireshark: 00:05:00 •Lab - Installing a Wireless Adapter in Kali: 00:09:00 •Lab - Hacking a Wireless Network Using Kali Linux: 00:14:00 •Capturing Wireless Traffic Using Wireshark: 00:05:00 •Lab - CTF Lab Build for HA: Forensics: 00:11:00 •Lab - Capture flag #1: 00:12:00 •Lab - Capture flag #2: 00:10:00 •Lab - Capture flag #3: 00:20:00 •Lab - Capture flag #4: 00:09:00 •Assignment - Digital Forensics for Cyber Professionals: 00:00:00

Digital Forensics for Cyber Professionals
Delivered Online On Demand5 hours 37 minutes
£12

CompTIA Security+ (SY0-401)

4.9(27)

By Apex Learning

Overview This comprehensive course on CompTIA Security+ (SY0-401) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA Security+ (SY0-401) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA Security+ (SY0-401). It is available to all students, of all academic backgrounds. Requirements Our CompTIA Security+ (SY0-401) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 10 sections • 41 lectures • 16:59:00 total length •The Information Security Cycle: 00:37:00 •Information Security Controls: 00:36:00 •Authentication Methods: 00:09:00 •Cryptography Fundamentals: 00:56:00 •Security Policy Fundamentals: 00:11:00 •Social Engineering: 00:32:00 •Malware: 00:25:00 •Software-Based Threats: 00:22:00 •Based Threats: 00:39:00 •Wireless Threats and Vulnerabilities: 00:43:00 •Physical Threats and Vulnerabilities: 00:09:00 •Manage Data Security: 00:47:00 •Manage Application Security: 00:55:00 •Manage Device and Host Security: 01:08:00 •Manage Mobile Security: 00:10:00 •Configure Security Parameters on Network Devices and Technologies: 00:49:00 •Network Design Elements and Components: 00:26:00 •Implement Networking Protocols and Services: 01:09:00 •Apply Secure Network Administration Principles: 00:12:00 •Secure Wireless Traffic: 00:31:00 •Access Control and Authentication Services: 00:43:00 •Implement Account Management Security Controls: 00:33:00 •Install a CA Hierarchy: 00:26:00 •Enroll Certificates: 00:13:00 •Secure Network Traffic by Using Certificates: 00:04:00 •Renew Certificates: 00:01:00 •Back Up and Restore Certificates and Private Keys: 00:06:00 •Revoke Certificates: 00:08:00 •Physical Security: 00:20:00 •Legal Compliance: 00:10:00 •Security Awareness and Training: 00:11:00 •Integrate Systems and Data with Third Parties: 00:09:00 •A Risk Analysis: 00:17:00 •Implement Vulnerability Assessment Tools and Techniques: 00:05:00 •Scan for Vulnerabilities: 00:27:00 •Mitigation and Deterrent Techniques: 00:19:00 •Respond to Security Incidents: 00:23:00 •Recover from a Security Incident: 00:10:00 •Business Continuity: 00:18:00 •Plan for Disaster Recovery: 00:17:00 •Execute DRPs and Procedures: 00:13:00

CompTIA Security+ (SY0-401)
Delivered Online On Demand16 hours 59 minutes
£12

Security Guard

4.5(3)

By Studyhub UK

Immerse yourself in the world of security as you embark on a comprehensive training journey to become a proficient security guard. This course delves into various aspects of security, covering the definition, significance, and career prospects of a security guard in the UK. Explore critical skills such as risk analysis, crisis response, and physical and information security protection. Unveil the strategic use of technology in security management and master general patrol tactics, public relations, and traffic control techniques. Gain insights into handling workplace violence, legal regulations, and industry standards. Equip yourself with the knowledge and skills required to excel as a professional security guard. Learning Outcomes: Understand the concept and importance of security in various settings. Explore the career prospects and opportunities available for security guards in the UK. Learn to perform security risk analysis and develop strategies for risk reduction. Gain expertise in ensuring physical and information security protection. Develop crisis response skills to manage immediate security threats. Discover the effective use of technology for security management. Master general patrol tactics and techniques. Enhance public relations skills and traffic control proficiency. Why buy this Security Guard?  Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Security Guard you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Security Guard course is ideal for Individuals aspiring to pursue a career as a security guard. Current security professionals seeking to enhance their skills and knowledge. Those interested in understanding security practices and principles. Individuals with an interest in public safety and security. Prerequisites This Security Guard was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Security Officer - Average Earnings: £20,000 - £25,000 per year. Security Supervisor - Average Earnings: £25,000 - £30,000 per year. Security Manager - Average Earnings: £30,000 - £40,000 per year. Site Security Coordinator - Average Earnings: £25,000 - £30,000 per year. Corporate Security Officer - Average Earnings: £25,000 - £35,000 per year. Course Curriculum Module 01: Definition and Importance of Security Definition and Importance of Security 00:16:00 Module 02: Career Prospect of Security Guard in the UK Career Prospect of Security Guard in the UK 00:11:00 Module 03: Security Risk Analysis and Risk Reduction Security Risk Analysis and Risk Reduction 00:25:00 Module 04: Physical and Information Security Protection Physical and Information Security Protection 00:36:00 Module 05: Response to Immediate Crisis Response to Immediate Crisis 00:26:00 Module 06: The Use of Technology for Managing Security The Use of Technology for Managing Security 00:25:00 Module 07: General Patrol Tactics and Techniques General Patrol Tactics and Techniques 00:25:00 Module 08: Public Relations and Traffic Control Public Relations and Traffic Control 00:21:00 Module 09: Violence in the Workplace Violence in the Workplace 00:27:00 Module 10: Laws and Regulations Laws and Regulations 00:29:00

Security Guard
Delivered Online On Demand4 hours 1 minutes
£10.99

Web Application Penetration Testing Course

4.5(3)

By Studyhub UK

The 'Web Application Penetration Testing' course is a comprehensive guide to identifying and mitigating vulnerabilities within web applications. Participants will learn the techniques and methodologies used by ethical hackers to assess and secure web applications against cyber threats. Covering topics such as cross-site scripting, SQL injection, authentication attacks, and more, this course equips learners with the knowledge and skills to perform effective penetration testing and enhance web application security. Learning Outcomes Understand the fundamentals of web application penetration testing and its importance in cybersecurity. Prepare for penetration testing activities, including setting up testing environments and tools. Explore web application technologies and their potential vulnerabilities. Learn the art of information gathering and mapping applications for vulnerability assessment. Master techniques to identify and exploit cross-site scripting (XSS) vulnerabilities. Why choose this Web Application Penetration Testing Course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Web Application Penetration Testing Course Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Web Application Penetration Testing Course for? Ethical hackers and cybersecurity professionals aiming to specialize in web application security. IT professionals seeking to expand their knowledge in identifying and mitigating web application vulnerabilities. Web developers interested in understanding and addressing potential security risks in their applications. Penetration testers aiming to enhance their skillset in assessing and securing web applications. Career path Penetration Tester: £25,000 - £70,000 Ethical Hacker: £30,000 - £80,000 Application Security Analyst: £35,000 - £65,000 Cybersecurity Consultant: £40,000 - £90,000 Web Security Administrator: £32,000 - £68,000 Vulnerability Assessment Analyst: £28,000 - £60,000 Prerequisites This Web Application Penetration Testing Course does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Web Application Penetration Testing Course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Unit 01: INTRODUCTION About The Course 00:03:00 Unit 02: BE PREPARED Web Attack Simulation Lab 00:12:00 Unit 03: WEB APPLICATION TECHNOLOGIES Web application technologies 101 - PDF 01:34:00 HTTP Protocol Basics 00:11:00 Encoding Schemes 00:13:00 Same Origin Policy - SOP 00:06:00 HTTP Cookies 00:11:00 Cross-origin resource sharing 00:05:00 Web application proxy - Burp suite 00:09:00 Unit 04: INFORMATION GATHERING - MAPPING THE APPLICATIONS Fingerprinting web server 00:05:00 DNS Analysis - Enumerating subdomains 00:04:00 Metasploit for web application attacks 00:12:00 Web technologies analysis in real time 00:03:00 Outdated web application to server takeover 00:08:00 BruteForcing Web applications 00:06:00 Shodan HQ 00:07:00 Harvesting the data 00:05:00 Finding link of target with Maltego CE 00:09:00 Unit 05: CROSS-SITE SCRIPTING ATTACKS - XSS Cross Site Scripting- XSS - PDF 01:08:00 Cross site scripting 00:07:00 Reflected XSS 00:14:00 Persistent XSS 00:11:00 DOM-based XSS 00:10:00 Website defacement through XSS 00:09:00 XML Documents & database 00:14:00 Generating XSS attack payloads 00:13:00 XSS in PHP, ASP & JS Code review 00:13:00 Cookie stealing through XSS 00:12:00 Advanced XSS phishing attacks 00:08:00 Advanced XSS with BeEF attacks 00:10:00 Advanced XSS attacks with Burp suite 00:08:00 Code Review Guide 06:20:00 Unit 06: SQL INJECTION ATTACKS - EXPLOITATIONS SQL Injection attacks - PDF 01:30:00 Introduction to SQL Injection 00:16:00 Dangers of SQL Injection 00:05:00 Hunting for SQL Injection vulnerabilities 00:20:00 In-band SQL Injection attacks 00:27:00 Blind SQL Injection attack in-action 00:10:00 Exploiting SQL injection - SQLMap 00:09:00 Fuzzing for SQL Injection - Burp Intruder 00:14:00 Unit 07: CROSS SITE REQUEST FORGERY - XSRF CSRF or XSRF attack methods 00:12:00 Anti-CSRF Token methods 00:15:00 Anti-CSRF token stealing-NOT easy 00:11:00 Unit 08: AUTHENTICATION & AUTHORIZATION ATTACKS Authentication bypass-hydra 00:11:00 HTTP Verb Tampering 00:09:00 HTTP parameter pollution - HPP 00:06:00 Authentication 00:10:00 Unit 09: CLIENT SIDE SECURITY TESTING Client side control bypass 00:10:00 Unit 10: FILE RELATED VULNERABILITIES LFI & RFI attacks 00:13:00 Unrestricted file upload - content type 00:06:00 Unrestricted File Upload - Extension Type 00:06:00 Remote code execution using Shell Uploads 00:09:00 Unit 11: XML EXTERNAL ENTITY ATTACKS - XXE XML Documents & database 00:14:00 XXE attacks in action 00:14:00 Resources Advance intruder attack types 00:23:00 Finding details with open source 00:17:00 Assignment Assignment - Web Application Penetration Testing Course 00:00:00

Web Application Penetration Testing Course
Delivered Online On Demand19 hours 37 minutes
£10.99