Do you want to prepare for your dream job but strive hard to find the right courses? Then, stop worrying, for our strategically modified IT and Data Protection (GDPR) Practitioner bundle will keep you up to date with the relevant knowledge and most recent matters of this emerging field. So, invest your money and effort in our 33 course mega bundle that will exceed your expectations within your budget. The IT and Data Protection (GDPR) Practitioner related fields are thriving across the UK, and recruiters are hiring the most knowledgeable and proficient candidates. It's a demanding field with magnitudes of lucrative choices. If you need more guidance to specialise in this area and need help knowing where to start, then StudyHub proposes a preparatory bundle. This comprehensive IT and Data Protection (GDPR) Practitioner bundle will help you build a solid foundation to become a proficient worker in the sector. This IT and Data Protection (GDPR) Practitioner Bundle consists of the following 30 CPD Accredited Premium courses - Course 1: IT Support Technician Course 2: Network Security and Risk Management Course 3: CompTIA Network Course 4: Information Management Course 5: Web Application Penetration Testing Course Course 6: CompTIA Cloud+ (CV0-002) Course 7: Learn Ethical Hacking with Kali Linux Course 8: Computer Operating System and Troubleshooting Course 9: Building Your Own Computer Course Course 10: It: Ethical Hacking, IT Security and IT Cyber Attacking Course 11: SQL Database Administrator Course 12: MS Word Essentials - The Complete Word Course - Level 3 Course 13: Data Protection (GDPR) Practitioner Course 14: Website Hacking From Scratch Course 15: Diploma in Front-End Web Development (HTML, CSS, & Bootstrap) Course 16: Data Science and Visualisation with Machine Learning Course 17: SQL For Data Analytics & Database Development Course 18: PLC Programming Diploma Course 19: Cisco ASA Firewall Training Course Course 20: Create Your First Responsive Website Course 21: C# (C-Sharp) Course 22: Web Design (HTML, CSS, Bootstrap) Complete Course Course 23: Python Course Course 24: JavaScript Course 25: Net MVC and Entity Framework Course Course 26: Learn Spring & Angular Material with a Full Web Application Course 27: Typescript Course 28: U&P AI - Natural Language Processing (NLP) with Python Course 29: Ruby on Rails Web Application Framework Course 30: SQL Server 101 : Microsoft SQL Server for Absolute Beginners 3 Extraordinary Career Oriented courses that will assist you in reimagining your thriving techniques- Course 1:Career Development Plan Fundamentals Course 2:CV Writing and Job Searching Course 3:Interview Skills: Ace the Interview Learning Outcome This tailor-made IT and Data Protection (GDPR) Practitioner bundle will allow you to- Uncover your skills and aptitudes to break new ground in the related fields Deep dive into the fundamental knowledge Acquire some hard and soft skills in this area Gain some transferable skills to elevate your performance Maintain good report with your clients and staff Gain necessary office skills and be tech savvy utilising relevant software Keep records of your work and make a report Know the regulations around this area Reinforce your career with specific knowledge of this field Know your legal and ethical responsibility as a professional in the related field This IT and Data Protection (GDPR) Practitioner Bundle resources were created with the help of industry experts, and all subject-related information is kept updated on a regular basis to avoid learners from falling behind on the latest developments. Certification After studying the complete training you will be able to take the assessment. After successfully passing the assessment you will be able to claim all courses pdf certificates and 1 hardcopy certificate for the Title Course completely free. Other Hard Copy certificates need to be ordered at an additional cost of •8. CPD 330 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Ambitious learners who want to strengthen their CV for their desired job should take advantage of the IT and Data Protection (GDPR) Practitioner bundle! This bundle is also ideal for professionals looking for career advancement. Certified Information Privacy Manager (CIPM) Certified Information Privacy Technologist (CIPT) Certified Information Privacy Professional/Europe (CIPP/E) Requirements To participate in this course, all you need is - A smart device A secure internet connection And a keen interest in IT and Data Protection (GDPR) Practitioner Career path Upon completing this essential Bundle, you will discover a new world of endless possibilities. These courses will help you to get a cut above the rest and allow you to be more efficient in the relevant fields. Certificates Quality Licence Scheme Endorsed Certificate of Achievement Hard copy certificate - Included Upon successful completion of the course, you will be eligible to order QLS Endorsed Hardcopy Certificate titled ' Data Protection (GDPR) Practitioner at QLS Level 3 ' Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses.
Complete Visual BASIC training course description A hands-on introduction to programming in Visual BASIC V6. What will you learn Build Visual BASIC applications. Build simple components. Debug Visual BASIC programs. Examine existing code and determine its function. Complete Visual BASIC training course details Who will benefit: Anyone wishing to program in Visual BASIC. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Complete Visual BASIC training course contents Application development using VB VB features. VB editions, VB terminology. Working in the Development Environment. Event-Driven Programming. Creating a program in VB. Project and executable files. VB reference materials. Visual Basic fundamentals Objects. Controlling objects. Introduction to forms. Introduction to controls. Basic controls. Working with code and forms Modules. Working with code. Interacting with the user. Working with code statements. Managing forms. Variables and procedures Introduction to variables and constants. Working with Procedures and Functions. Controlling program execution Common VB functions. Comparison and relational operators. Conditional structures. Looping structures. Debugging Error types. Debugging logic errors in VB. Working with controls Control types. Standard controls. Advanced standard controls. ActiveX controls. Insertable controls. Data access using the ADO data control Overview of ActiveX Data Objects. VB data access features. Relational database concepts. Using the ADO data Control to access data. SQL. Manipulating data. Using the data form wizard. Input validation Field-Level validation. The masked edit control. Form-Level validation. Form events used when validating data. Error trapping Trapping run time errors. Error handling overview. Enabling an error trap. Errors and the calling chain. In line error handling. Enhancing the User Interface Menus. Status bars. Toolbars. Drag and Drop Overview of Drag and Drop. Mouse events Drag and Drop basics. More about controls Using control arrays. Using the controls collection. Working with object variables. Collections. Finishing touches User Interface design principles. Distributing an application. Creating a default project.
Register on the Advanced SAS Programming Using MacrosSQL today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Advanced SAS Programming Using MacrosSQL is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Advanced SAS Programming Using MacrosSQL Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Advanced SAS Programming Using MacrosSQL, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Advanced SAS Programming Using MacrosSQL Unit - 1 Section 0-00- Why SAS 00:01:00 Unit - 2 Section 2-02- SAS Studio through SAS OnDemand- Registration 00:04:00 Section 2-03- Logging-in to SAS after installation 00:01:00 Section 2-04- SAS Interface and windows 00:06:00 Unit - 3 Section 3-00- Section Overview - Macros 00:01:00 Section 3-01-Macro Variables - introduction 00:14:00 Section 3-02-Application of macro variables 00:13:00 Section 3-03-01-Nested macro vars 00:11:00 Section 3-03-02-More on Ampersand resolutions using a cool example 00:09:00 Section 3-04-00-SAS Macros - introduction 00:10:00 Section 3-04-01-SAS Macros - Examples 00:07:00 Section 3-04-02-Keyword positional and mixed params 00:06:00 Section 3-04-03-Conditional Logic in Macros 00:11:00 Section 3-05-Macro Functions 00:12:00 Section 3-05-Options Statement- mprint-mlogic-symbolgen 00:13:00 Section 3-07-Connecting the two worlds - Call Symput - Symget 00:14:00 Section 3-09-01-02- Bringing data into SAS using Import Wizard 00:04:00 Section 3-09-02- Bringing data into SAS using LIBNAME statement 00:05:00 Section 3-09-03- Bringing data into SAS using FILENAME 00:05:00 Unit - 4 Section 4-00- Section Overview - Proc SQL 00:01:00 Section 4-01-01-Proc SQL - copying data 00:13:00 Section 4-01-02-Proc SQL - filtering data 00:07:00 Section 4-01-03-Proc SQL - sorting data 00:08:00 Section 4-01-04-Proc SQL - removing duplicates 00:05:00 Section 4-02-01-Proc SQL - Union 00:09:00 Section 4-02-02-Proc SQL - Except 00:04:00 Section 4-02-03-Proc SQL - Intersect 00:02:00 Section 4-03-00-Merging data using Joins-Introduction 00:08:00 Section 4-03-01-Proc SQL - inner join 00:14:00 Section 4-03-02-Proc SQL - full join 00:08:00 Section 4-03-03-Proc SQL - left and right joins 00:07:00 Section 4-04-01-Proc SQL - creating macro vars 00:07:00 Unit - 5 Section 5-00- Bonus lecture 00:02:00 Resources Resources - Advanced SAS Programming Using MacrosSQL 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.
Take the initial steps toward a successful long-term career by studying the IT package online with StudyHub through our online learning platform. After completing extensive research, we designed this customised IT course to ease your journey toward your goal. The IT course covers all of the latest information to keep you ahead of the job market and prepare you for the next step. The IT bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This IT Training Bundle consists the following career oriented courses: Course 01: IT Support Technician Course 02: Network Security and Risk Management Course 03: CompTIA Network Course 04: Information Management Course 05: Web Application Penetration Testing Course Course 06: CompTIA Cloud+ (CV0-002) Course 07: Learn Ethical Hacking From A-Z: Beginner To Expert Course 08: Computer Operating System and Troubleshooting Course 09: Building Your Own Computer Course Course 10: It: Ethical Hacking, IT Security and IT Cyber Attacking Course 11: SQL Database Administrator Course 12: MS Word Essentials - The Complete Word Course - Level 3 Course 13: Data Protection (GDPR) Practitioner Course 14: Website Hacking From Scratch Course 15: Diploma in Front-End Web Development (HTML, CSS, & Bootstrap) Course 16: Data Science and Visualisation with Machine Learning Course 17: SQL For Data Analytics & Database Development Course 18: PLC Programming Diploma Course 19: Cyber Security Incident Handling and Incident Response Course 20: Cyber Security Law Course 21: C# (C-Sharp) Course 22: Web Design (HTML, CSS, Bootstrap) Complete Course Course 23: Python Course Course 24: JavaScript Course 25: ASP.Net MVC and Entity Framework Course Course 26: Learn Spring & Angular Material with a Full Web Application Course 27: Coding Essentials - Javascript, ASP. Net, C# - Bonus HTML Course 28: Project on Deep Learning - Artificial Neural Network (ANNs) Course 29: Build Progressive Web Apps with Angular Course 30: Microsoft SQL Server Development for Everyone! Course 31: Building Big Data Pipelines with PySpark MongoDB and Bokeh Course 32: Microsoft Azure Machine Learning Course 33: Linux Basics Course 34: Linux File Management System Course 35: C Programming Language for Beginners on Linux Course 36: Linux Security and Hardening Course 37: Linux Shell Scripting Course 38: Learn Ethical Hacking From A-Z: Beginner To Expert Course 39: Securing an Ubuntu Linux Server against Hackers Masterclass Course 40: Python 3 Programming The IT Training Bundle has been prepared by focusing largely on career readiness. The IT course has been prepared by focusing largely on career readiness. It has been designed by our IT specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided with IT, if it's required by any learners. Certification After studying the complete training, you will be able to participate in the course assessment, which is included in the course. After completing the assessment, you can claim all courses pdf certificates for free. Hard Copy certificates need to be ordered at an additional cost of •8. CPD 400 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This IT Training course is suitable for - Students Recent graduates Job Seekers further progress towards NCFE Level 3 Diploma in Skills for Business: IT Requirements There is no formal qualification needed for this IT Training course. Career path You will be able to achieve a lucrative career because this IT Training Bundle includes various courses as a bonus. Certificates Certificate of completion Digital certificate - Included
Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.
Imagine a world where the vast realms of IT and analytics seem intricate, and the data emanating from every corner feels overwhelming. Now, reimagine a world where you have the power to interpret, analyse, and make that data sing a tune of actionable insights. Welcome to our "IT and Analytics" bundle, where complexity turns into simplicity. Dive deep into the myriad elements of IT and analytics, encompassing everything from the basics of Google Analytics and Excel Pivot Tables to the advanced nuances of Windows 10 troubleshooting. This comprehensive bundle caters to both beginners and seasoned professionals, offering in-depth theoretical knowledge that is instrumental in the real world. By immersing yourself in these carefully curated courses, you are setting the foundation for deciphering data, understanding IT basics, and recruiting the right IT talent. The purpose of this bundle is clear: to mould learners into well-rounded professionals with a keen sense for IT and analytics. Whether you're looking to streamline business processes, bolster your IT department, or simply understand the data-centric world around you, this is your golden ticket. Take the leap and embrace the future of IT and analytics today! Courses Included: Course 1: Google Analytics for Everyone Course 2: RCA: Root Cause Analysis Course 3: SQL for Data Science, Data Analytics and Data Visualization Course 4: Introduction to Data Analytics with Tableau Course 5: Excel Pivot Tables Course 6: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 7: Recruitment: IT Basics for IT Recruiters Course 8: Advance Windows 10 Troubleshooting for IT HelpDesk Learning Outcomes: Understand the fundamentals and advanced features of popular IT and analytics platforms. Gain theoretical insights into root cause analysis and its applications. Enhance decision-making abilities through data visualisation techniques. Grasp the essence of IT recruitment and selection of appropriate candidates. Master troubleshooting methods and strategies for Windows 10. Build foundational knowledge in IT essentials through the CompTIA IT Fundamentals ITF+ curriculum. Google Analytics for Everyone Decode user behaviour and make informed decisions with Google Analytics. RCA: Root Cause Analysis Uncover the underlying reasons behind complex issues through structured analysis. SQL for Data Science, Data Analytics and Data Visualization Harness the power of SQL for effective data science and visualization. Introduction to Data Analytics with Tableau Dive into data storytelling and visualisation with Tableau. Excel Pivot Tables Master Excel's Pivot Tables for dynamic data analysis. CompTIA IT Fundamentals ITF+ (FCO-U61) Establish a solid IT foundation with CompTIA IT Fundamentals. Recruitment: IT Basics for IT Recruiters Learn the essentials of IT recruitment and talent selection. Advance Windows 10 Troubleshooting for IT HelpDesk Elevate your troubleshooting skills for Windows 10 environments. CPD 80 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Aspiring data analysts keen on mastering theoretical aspects of IT and analytics. IT enthusiasts looking to enhance their knowledge base. Business professionals aiming to understand IT-related decisions better. HR and recruitment professionals with a focus on IT hiring. Anyone with a passion for data interpretation and the world of IT. Career path Data Analyst - £30K to £50K/year. IT Support Specialist - £25K to £45K/year. IT Recruiter - £28K to £55K/year. Database Administrator - £35K to £60K/year. Business Intelligence Analyst - £32K to £58K/year. IT Consultant - £40K to £70K/year. Systems Administrator - £30K to £55K/year. Certificates CPD Certificate Of Completion Digital certificate - Included 8 Digital Certificates Are Included With This Bundle CPD Quality Standard Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99 Hardcopy Transcript - £9.99
Advanced Kibana training course description This training course is aimed at users who already have some experience with Kibana, who are looking to further their knowledge. What will you learn Lens Timelion Maps Custom Visualisations with Vega Canvas Filters and Controls Drilldown and Dashboards KQSL and ElasticQueries Scripted and RunTime Fields Alerts and Alarms Advanced Kibana training course details Who will benefit: Users who already have some experience with Kibana, who are looking to further their knowledge. Prerequisites: None Duration 1 day Advanced Kibana training course contents Topics Lens Visualisation types (tables,bars,charts) Category breakdown Adding multiple metrics Using formulas in metrics Labels Adding reference layer Limitations Visualise Library Timeseries, Metrics Different types of aggregations Maps GeoMapping Heat Maps Using ES index as data source Visualisation, tool tips Custom Visualisations with Vega Introduction to vega scripting Canvas Widgets and Texts Elasticsearch SQL Canvas Expressions Filters and Controls Dropdown filters Ad-hoc filters Searchbar filters Drilldown Dashboards Linking one dashboard to another KQSL and ElasticQueries Bool Query AND/OR Phrase Part match vs keyword search Wildcard search Scripted and RunTime Fields Creating ad-hoc calculated fields using scripts Performance issues Alerts and Alarms Query Based Formatting output Connector types(email,index,teams etc)
Embark on a riveting expedition into the realm of website security with our course, 'Website Hacking From Scratch.' Delve deep into the labyrinth of potential vulnerabilities, from SQL injections to XSS vulnerabilities, equipping yourself with the prowess to identify and safeguard against digital threats. By course end, learners are not only conversant with the anatomy of website vulnerabilities but are also adept at leveraging tools like Owasp ZAP for holistic website fortification. Learning Outcomes Gain comprehensive insights into the foundation of website vulnerabilities and their exploitation. Understand and identify risks associated with file uploads, code executions, and session management. Acquire proficiency in detecting and safeguarding against SQL and XSS vulnerabilities. Master the use of automated tools, such as Owasp ZAP, in vulnerability detection. Develop strategies for effective post-exploitation management. Why choose this Website Hacking From Scratch course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Website Hacking From Scratch Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Website Hacking From Scratch course for? Aspiring cybersecurity enthusiasts eager to delve into website security. Web developers keen to fortify their sites against potential breaches. IT professionals aiming to enhance their repertoire with security expertise. Entrepreneurs looking to ensure the robustness of their online platforms. Individuals curious about ethical hacking and its applications. Career path Ethical Hacker: £25,000 - £70,000 Penetration Tester: £30,000 - £60,000 Cybersecurity Analyst: £28,000 - £55,000 IT Security Consultant: £35,000 - £75,000 Web Security Manager: £40,000 - £80,000 Information Security Officer: £45,000 - £85,000 Prerequisites This Website Hacking From Scratch does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Website Hacking From Scratch was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Course Introduction Course Introduction 00:02:00 Preparation - Creating a Penetration Testing Lab Lab Overview & Needed Software 00:08:00 Installing Kali 2019 As a Virtual Machine Using a Ready Image 00:10:00 Installing Kali 2019 As a Virtual Machine 00:10:00 Installing Metasploitable As a Virtual Machine 00:04:00 Preparation - Linux Basics Basic Overview of Kali Linux 00:05:00 The Linux Terminal & Basic Linux Commands 00:11:00 Configuring Metasploitable & Lab Network Settings 00:06:00 Website Basics What is a Website? 00:04:00 How To Hack a Website? 00:04:00 Information Gathering Gathering Information Using Whois Lookup 00:05:00 Discovering Technologies Used On The Website 00:06:00 Gathering Comprehensive DNS Information 00:10:00 Discovering Websites On The Same Server 00:04:00 Discovering Subdomains 00:12:00 Discovering Sensitive Files 00:07:00 Analysing Discovered Files 00:04:00 Maltego - Discovering Servers, Domains & Files 00:08:00 Maltego - Discovering Websites, Hosting Provider & Emails 00:05:00 File Upload Vulnerabilities What are they? And How To Discover & Exploit Basic File Upload Vulnerabilities 00:07:00 HTTP Requests - GET & POST 00:04:00 Intercepting HTTP Requests 00:07:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 Exploiting More Advanced File Upload Vulnerabilities 00:04:00 [Security] Fixing File Upload Vulnerabilities 00:06:00 Code Execution Vulnerabilities What are they? & How To Discover & Exploit Basic Code Execution Vulnerabilities 00:07:00 Exploiting Advanced Code Execution Vulnerabilities 00:06:00 [Security] - Fixing Code Execution Vulnerabilities 00:06:00 Local File Inclusion Vulnerabilities (LFI) What are they? And How To Discover & Exploit Them 00:06:00 Gaining Shell Access From LFI Vulnerabilities - Method 1 00:07:00 Gaining Shell Access From LFI Vulnerabilities - Method 2 00:11:00 Remote File Inclusion Vulnerabilities (RFI) Remote File Inclusion Vulnerabilities - Configuring PHP Settings 00:04:00 Remote File Inclusion Vulnerabilities - Discovery & Exploitation 00:06:00 Exploiting Advanced Remote File Inclusion Vulnerabilities 00:03:00 [Security] Fixing File Inclusion Vulnerabilities 00:06:00 SQL Injection Vulnerabilities What is SQL 00:06:00 Dangers of SQL Injections 00:03:00 SQL Injection Vulnerabilities - SQLi In Login Pages Discovering SQL Injections In POST 00:08:00 Bypassing Logins Using SQL Injection Vulnerability 00:05:00 Bypassing More Secure Logins Using SQL Injections 00:06:00 [Security] Preventing SQL Injections In Login Pages 00:08:00 SQL Injection Vulnerabilities - Extracting Data From The Database Discovering SQL Injections in GET 00:07:00 Reading Database Information 00:05:00 Finding Database Tables 00:04:00 Extracting Sensitive Data Such As Passwords 00:04:00 SQL Injection Vulnerabilities - Advanced Exploitation Discovering & Exploiting Blind SQL Injections 00:06:00 Discovering a More Complicated SQL Injection 00:07:00 Extracting Data (passwords) By Exploiting a More Difficult SQL Injection 00:05:00 Bypassing Filters 00:05:00 Bypassing Security & Accessing All Records 00:09:00 [Security] Quick Fix To Prevent SQL Injections 00:07:00 Reading & Writing Files On The Server Using SQL Injection Vulnerability 00:06:00 Getting A Reverse Shell Access & Gaining Full Control Over The Target Web Server 00:08:00 Discovering SQL Injections & Extracting Data Using SQLmap 00:07:00 [Security] - The Right Way To Prevent SQL Injection 00:05:00 XSS Vulnerabilities Introduction - What is XSS or Cross Site Scripting? 00:03:00 Discovering Basic Reflected XSS 00:04:00 Discovering Advanced Reflected XSS 00:05:00 Discovering An Even More Advanced Reflected XSS 00:07:00 Discovering Stored XSS 00:03:00 Discovering Advanced Stored XSS 00:04:00 XSS Vulnerabilities - Exploitation Hooking Victims To BeEF Using Reflected XSS 00:06:00 Hooking Victims To BeEF Using Stored XSS 00:04:00 BeEF - Interacting With Hooked Victims 00:04:00 BeEF - Running Basic Commands On Victims 00:04:00 BeEF - Stealing Credentials/Passwords Using A Fake Login Prompt 00:02:00 Bonus - Installing Veil 3.1 00:06:00 Bonus - Veil Overview & Payloads Basics 00:07:00 Bonus - Generating An Undetectable Backdoor Using Veil 3 00:10:00 Bonus - Listening For Incoming Connections 00:07:00 Bonus - Using A Basic Delivery Method To Test The Backdoor & Hack Windows 10 00:07:00 BeEF - Gaining Full Control Over Windows Target 00:04:00 [Security] Fixing XSS Vulnerabilities 00:07:00 Insecure Session Management Logging In As Admin Without a Password By Manipulating Cookies 00:06:00 Discovering Cross Site Request Forgery Vulnerabilities (CSRF) 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using a HTML File 00:07:00 Exploiting CSRF Vulnerabilities To Change Admin Password Using Link (Preview) 00:06:00 [Security] The Right Way To Prevent CSRF Vulnerabilities 00:09:00 Brute Force & Dictionary Attacks What Are Brute Force & Dictionary Attacks? 00:04:00 Creating a Wordlist 00:07:00 Launching a Wordlist Attack & Guessing Login Password Using Hydra 00:14:00 Discovering Vulnerabilities Automatically Using Owasp ZAP Scanning Target Website For Vulnerabilities 00:04:00 Analysing Scan Results 00:04:00 Post Exploitation Post Exploitation Introduction 00:04:00 Interacting With The Reverse Shell Access Obtained In Previous Lectures 00:07:00 Escalating Reverse Shell Access To Weevely Shell 00:08:00 Weevely Basics - Accessing Other Websites, Running Shell Commands etc 00:07:00 Bypassing Limited Privileges & Executing Shell Commands 00:05:00 Downloading Files From Target Webserver 00:05:00 Uploading Files To Target Webserver 00:08:00 Getting a Reverse Connection From Weevely 00:08:00 Accessing The Database 00:09:00 Resources Resources - Website Hacking From Scratch 00:00:00 Assignment Assignment - Website Hacking From Scratch 00:00:00