Tutorialspoint

April Learning Carnival is here, Use code FEST10 for an extra 10% off

Ethical Hacking: Hacking Applications

person icon Stone River ELearning

4.5

Ethical Hacking: Hacking Applications

Understanding and securing modern application architecture

updated on icon Updated on Apr, 2024

language icon Language - English

person icon Stone River ELearning

English [CC]

category icon IT & Software,Network & Security,Ethical Hacking

Lectures -9

Duration -1 hours

4.5

price-loader

30-days Money-Back Guarantee

Training 5 or more people ?

Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.

Course Description

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX.

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately.

Ethical Hacking: Hacking Applications

Curriculum

Check out the detailed breakdown of what’s inside the course

Hacking Applications
9 Lectures
  • play icon Application Architecture and Security 07:56 07:56
  • play icon Hamster and Ferret 05:56 05:56
  • play icon Morpheus 04:22 04:22
  • play icon Heap Spraying Demonstration 04:30 04:30
  • play icon OWASP Zed Attack Proxy 12:13 12:13
  • play icon Persistent XSS Demo 01:53 01:53
  • play icon Buffer Overflow Demonstration 04:36 04:36
  • play icon Buffer Overflows Explained 23:18 23:18
  • play icon Hacking AJAX 09:25 09:25

Instructor Details

Stone River eLearning

Stone River eLearning

e


Course Certificate

Use your certificate to make a career change or to advance in your current career.

sample Tutorialspoint certificate

Our students work
with the Best

Related Video Courses

View More

Annual Membership

Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses

Subscribe now
Annual Membership

Online Certifications

Master prominent technologies at full length and become a valued certified professional.

Explore Now
Online Certifications

Talk to us

1800-202-0515