Image
Applied Cyber ​​Security

Applied Cyber ​​Security

5.00
(1 Rating)
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

The course aims to briefly increase the network structure and communication, and then increase the general knowledge level about cryptology. Then it gives information about linux commands and linux directories and permissions. After these parts, the tools used in the attack phase and the methodology of the attack are shown to all our students in practice. At the end of the training, you will be able to find answers to questions such as how a system can be hacked, web application attack techniques and vulnerabilities, network attacks, password attacks, information in the passive and active information collection phase, and how to exploit. During the course, many hacking operations will be carried out on two target machines in practice.

Show More

What Will You Learn?

  • 90% of the content in the training is shown practically.
  • Applied Machine Hacking
  • Web Attacks and Vulnerabilities Applied
  • Brute Force Attacks John The Ripper - Crunch - Cupp
  • Hacking Through Virtual Machine
  • Network Communication Structure
  • Cryptology, Linux and Commands
  • Cyber ​​Kill Chain Model
  • Metasploit- Nmap - Searchsploit - Burp Suit - Nikto - Dimitry
  • Passive and Active Information gathering
  • Exploit selection phase
  • Kali linux commands
  • HTML INJECTION
  • IDOR
  • iFrame Injection
  • Restrict Device Access
  • OS Command Injection
  • XML/XPath Injection
  • BA -Session Management
  • Directory Traversal
  • XML External Entity Attacks (XXE)
  • General Attack Methodology
  • XSS
  • SQL injection - SQL blind
  • HTTP , SYN , UDP flooding
  • Reverse Shell - Bind Shell
  • PHP Code Injection
  • PHP EVAL FUNCTION
  • SERVER SIDE INCLUDES (SSI)

Course Content

Basic Linux

  • Master Router
    00:48
  • External Vulnerability Scan
    00:29
  • Built-in Vulnerability Scan
    00:48
  • Custom Router Firmware
    00:48

Passive and Active

Metasploitable

Web Vulnerabilities

Student Ratings & Reviews

No Review Yet
No Review Yet