Udemy

Platform

English

Language

Network & Security

Category

Complete Website Ethical Hacking and Penetration Testing

Learn 100% Hands-On Real World Practical Approach!! Website Hacking / Bug Bounty / Ethical Hacking / Penetration Pro

4.57 (689 reviews)

Students

10 hours

Content

Jul 2021

Last Update
Regular Price

BLUE HOST
Blue Host
Fast, easy, and secure WordPress hosting in minutes + 1 free domain name
$2.95/month

What you will learn

What is Virtualization

What is Virtual Machine

Kali Linux 2020

Master Linux Commands

Troubleshoot Kali Linux

System Commands

Network Commands

User Commands

Add and Delete User with full Sudo Permission

What is DVWA

What is XAMPP

Command Injection Attack

File Inclusion Attack

File Upload Attack

XSS Attack

DOM Based XSS Attack

Reflected XSS Attack

Stored XSS Attack

What is OWASP Mutillidae II

Root Access

SQL Injection

SQL MAP

How to solve Security Challenges

Scan WebServer using NIKTO

Burp Suite

BEEF Framework

OWASP Juice Shop


Description

Hello everyone..!!

welcome to the CWAPT i.e. the Complete Web application Penetration Testing Practical Course . My name is DEBAYAN DEY and i will be your Instructor for the CWAPT Course.

Now this course is designed for anyone who is interested in learning how an attacker attack and get the information from website by exploiting various vulnerabilities available.

CWAPT is designed by keeping in mind that most of us are having laptops or computer machine to work for most of the time and in a survey , we came up with the answer that most of the Computer users are very much interested in Learning how Web Application Penetration Testing works and what are the process in which we use penetration testing and security skills to find different vulnerabilities in web applications. As we all know , website and webservers plays an important role in every modern organization, Thats why in this course curriculum , Only you need a computer device and this entire course is 100% practical based ! isn't this amazing ??? and everything will be explained in depth , followed with reading materials and quizes which will give you a boost in the field of Ethical Hacking!!! so all in one , you just require a computer device and turn it into powerful ethical hacking machine.


Little brief about my name ,   i am Certified Secure Computer User (CSCU) v2 , and Certified Ethical Hacker (CEH V10) from EC COUNCIL

also i am certified Google IT support from Google , and currently doing  micromaster  in the Field of Cyber Security from Rochester institute of technology (RIT) New York in edx .

here are few of my other accomplishments in the field of cyber security ,

  • Introduction to Cyber Attacks , New York University

  • introduction to Cyber security for business , University of Colorado System

  • Palo Alto Networks academy cybersecurity foundation  , Palo alto networks

  • International cyber conflicts  , The State University of New York

  • Cyber Attacks Countermeasures , New York University

  • Networking ans security Architecture with Vmware NSX

  • Enterprise System Management and security ,University of Colorado System

Rest we'll have a meet and greet section to know other Learners ...!!!

so whats there in this CWAP COURSE?

First of all i would love to tell you , that this course is not limited to time . you may see 4 or 5 sections today , once you land in this course after few weeks , you'll see more sections and videos are added up. so this is the advantage of taking this course that you'll get regular updates about the new features and attacks and how you , as an individual person as well as organization or company can prevent from such an attack.


The web application penetration testing key outcome is to identify security weakness across the entire web application and its components (source code, database, back-end network).It also helps in prioritizing the identified vulnerabilities and threats, and possible ways to mitigate them.


so keeping these outcomes in mind , in 1st section of CWAPT course ,

you'll come across the setting up the lab environment wherein you'll download N install virtual box , then Kali linux 2020 and the entire configuration.

  • Meet and Greet !!!

  • Downloading and installation of virtual box

  • Understanding of what is Virtual Machine

  • Download  of Kali Linux Virtual Box image

  • Installation of Kali linux 2020

  • Booting up kali in virtual box for the 1st time

  • Default login and update and upgrade

  • Full Screen and understanding FSH i.e. File System Hierarchy

  • and much more with Reading Materials and Quizzes ..!!


in 2nd section ,

we will come across various commands used in Kali Linux and we'll get familiar with our Hacking machine. this section is very important as you'll be understanding the basic commands which we will be using in our course , so make sure you understand this section very clearly.

  • Basic linux command who am i

  • Basic Commands su and pwd

  • Basic command ls touch nano

  • Basic command cat cp mkdir

  • Basic Command mv and rm

  • System and User Commands

  • Network commands

  • Add New User with full sudo Permission

  • How to delete user using command line

  • and much more with Reading Materials and Quizzes ..!!


next section , i.e. our 3rd Section will cover DVWA.

What is  DVWA?

DVWA is a DAMM VULNERABLE WEB APP coded in PHP/MYSQL. Seriously it is too vulnerable. In this app security professionals, ethical hackers test their skills and run this tools in a legal environment. It also helps web developer better understand the processes of securing web applications and teacher/students to teach/learn web application security in a safe environment.

  • What is DVWA

  • XAMPP Theory and Installation

  • DVWA download Install and configuration with XAMPP

  • Command Injection Low , Medium and High Security

  • File Inclusion Low , Medium and High Security

  • File Upload  Low , Medium and High Security

  • XSS DOM Low , Medium and High Security

  • XSS Reflected Low , Medium and High Security

  • XSS Stored Low , Medium and High Security

  • and much more with Reading Materials and Quizzes ..!!

The aim of DVWA is to practice some of the most common web vulnerability, with various difficulties levels.

We gonna learn what is DVWA used for , we'll use XAMP and understand its working.

As the name suggests DVWA has many web vulnerabilities. Every vulnerability has four different security levels, low, medium, high and impossible. The security levels give a challenge to the ‘attacker’ and also shows how each vulnerability can be counter measured by secure coding.

We'll cover command injection , file inclusion , file upload various cross site scripts, we will come across burp suite and much more

So every month , you'll get regular updates in this DVWA section.


Coming to our 4th section , we will work with OWASP MUTILLIDAE.


OWASP Mutillidae II is a free, open source, deliberately vulnerable web-application providing a target for web-security enthusiast. it Has over 40 vulnerabilities and challenges. Contains at least one vulnerability for each of the OWASP Top Ten 2007, 2010, 2013 and 2017.

  1. Download and install Mutillidae II

  2. Root access denied fixed

  3. SQL Injection

  4. SQL Injection Reexplained

  5. SQL injection with SQL MAP

  6. How to solve show hints in security level 5 challenge

  7. How to scan a webserver using NIKTO

  8. XSS in Mutilidae Theory and Practical

  9. DOM based XSS Explanation

  10. Reflected XSS

  11. Stored XSS

  12. BEEF Framework

  13. and much more with Reading Materials and Quizzes ..!!

So from a variety of 40 vulnerabilities , 1st we gonna cover , sql injection , sql map, how to solve security level challenges , we'll learn how to scan webservers using Nikto , various XSS attacks , MORE Importantly , we will learn the usage of burp suite , and neef Framework , which is very essential to understand and learn from Website Penetration tester perspective and wr have much more to cover in this section as well .

So every month , you'll get regular updates in this Mutillidae section as well.


Coming to our next section , i.e. 5th Section , we have OWASP JUICE shop.

OWASP Juice Shop is probably the most modern and sophisticated insecure web application! It can be used in security trainings, awareness demos, Ctfs etc.

  1. What is OWASP Juice shop and installation of nodejs and npm

  2. OWASP juice shop up in running

  3. Finding the Score Board Level 1 Difficulty Challenge

  4. Zero Star Feedback Level 1 Difficulty Challenge

  5. Access Confidential Document Level 1  Difficulty Challenge

  6. DOM based XSS Level 1 Difficulty Challenge

  7. Error Handling Level 1 Difficulty Challenge

  8. Missing Encoding Level 1 Difficulty Challenge

  9. Bonus Payload DOM XSS Level 1 Difficulty Challenge

  10. Exposed Metrics Level 1 Challenge

  11. Outdated WhiteList Level 1 Challenge

  12. Privacy Policy Level 1 Difficulty Challenge

  13. Repetitive Registration Level 1 Difficulty Challenge

  14. and much more to cover ...!!!

Juice Shop encompasses vulnerabilities from the entire OWASP Top Ten along with many other security flaws found in real-world applications!

Currently we are having 6 levels in owasp juice shop . we will start with level 1 and gradually increase our difficult level.

We gonna cover , missing encoding , error handling security , confidential document , hoe to extract sensitive data , we'll see how we can invade privacy policy , weird cryptographic issues and much more.

So every month , you'll get regular updates in Owasp Juice Shop section as well.


So , by going through all these sections , you'll be comfortable enough to understand how Web Application Penetration Testing works and with regular updates , you'll be able to brush up your skills as well.

Plus you'll have a bonus section as well which will guide you through various upcoming courses as well my Instagram page and youtube channel where you'll get regular updates in the field of cyber security and travel and tourism across the globe.


So all the sections will cover Quizzes , Assignments and Reading Materials .

Also , all the sections will be updated on regular basis and new sections will also be added up , so once you are enrolled in the course , you'll surely gonna learn various techniques how attackers attack and how we can safe ourselves from getting attacked.


  • Most importantly , this course is completely for educational purpose


  • all the attacks which an attacker perform  are demonstrated to you so that you understand the technology and the art behind it and you're not fooled by any kind of social engineering.


  • This course is for educational and awareness purpose , to make everyone aware and be safe and protect your data.


  • Its a request , please do not perform any illegal activities , Udemy and me ( Debayan Dey ) is not responsible for  your illegal activities you perform.


Feel Free to Reach out at any point of time , i will be happy to Help you , and if you face any PROBLEM , just post your DOUBTS , you will be Answered within 24hrs to 48hrs of time ..!!!!!


so, welcome to the world of Complete Web application Penetration Testing Practical Course .


ARE YOU EXCITED to learn 100% complete practical course  and help your family , Organization and Company stay secured and safe from data theft and from hackers ?


wish you all the best !!!


Do follow our Instagram page and youtube channel for regular updates .


Wish you all the best...!!!!

See you in the course landing page ....!!!!


Screenshots

Complete Website Ethical Hacking and Penetration Testing
Complete Website Ethical Hacking and Penetration Testing
Complete Website Ethical Hacking and Penetration Testing
Complete Website Ethical Hacking and Penetration Testing

Content

Setting Up the Lab Environment

SQL MAP Promo Video

Downloading and installation of virtual box

Optional Reading Material

Understanding of what is Virtual Machine

Optional Reading Material

Download of Kali Linux Virtual Box image

Optional Reading Material

Installation of Kali linux 2020

Booting up kali in virtual box for the 1st time

Default login and update and upgrade

Full Screen and understanding FSH i.e. File System Hierarchy

Optional Reading Material for FILE SYSTEM HIERARCHY in Linux

Expand Your Knowledge

Q/A Session with instructor and various Social Media availability

Kali Linux Basics

Rate the Course

Basic linux command who am i

WHO AM I command Optional Reading Material

Basic Commands su and pwd

SU and PWD command Optional Reading Material

Basic command ls touch nano

LS command Optional Reading Material

TOUCH command Optional Reading Material

NANO Command Optional Reading Material

Basic command cat cp mkdir

Cat Command Optional Reading Material

CP command Optional Reading Material

mkdir Command Optional Reading Material

Basic Command mv and rm

MV command Optional Reading Material

RM command Optional Reading Material

System and User Commands

Network commands

Add New User with full sudo Permission

How to delete user using command line

Kali Linux Basic Commands MCQ

Q/A Session with instructor and various Social Media availability

DVWA

What is DVWA theory

DVWA Optional Reading Material

Update upgrade dist upgrade

XAMPP Theory and Installation

XAMPP Optional Reading Material

DVWA download Install and configuration with XAMPP

Command Injection Low Level

Command Injection Optional Reading Material

Command Injection Medium Level

Command injection High Security

DVWA Command Injection Optional Reading Material

File Inclusion Low Level Security

File Inclusion Optional Reading Material

File Inclusion Medium Security

File Inclusion High Security

DVWA File Inclusion Attack Optional Reading Material

File Upload low security Part 1

File Upload Optional Reading Material

File Upload Low Level Security Part 2

File Upload Medium Level

File Upload High Level

DVWA File Upload Optional Reading Material

XSS DOM low level

XSS DOM Optional Reading Material

XSS DOM Medium and High Security

DVWA XSS DOM Optional Reading Material

XSS Reflected Low Level

XSS Reflected Optional Reading Material

XSS Reflected Medium Level

XSS Reflected High Level

DVWA XSS Reflected Optional Reading Material

XSS Stored Low Level

XSS Stored Optional Reading Material

XSS Stored Medium Level

XSS Stored High Level

Q/A Session with instructor and various Social Media availability

OWASP Mutillidae II

Download and install Mutillidae II

OWASP MUTILLIDAE Optional Reading Material

Root access denied fixed

SQL Injection

SQL Injection Reading Material

SQL Injection Reexplained

SQL injection with SQL MAP_part 1

SQL injection with SQL MAP_part2

Rate the Course

SQL MAP Optional Reading Material

How to solve show hints in security level 5 challenge

How to scan a webserver using NIKTO

NIKTO Optional Reading Material

XSS in Mutilidae Theory and Practical

DOM based XSS Explanation Part 1

DOM Based XSS Part 2

Reflected XSS

Stored XSS

BEEF Framework Part 1 Explaination

BEEF Framework Optional Reading Material

BEEF Framework Part 2 XSS

BEEF Framework Part 3 Getting full control of the Victims Page

BEEF Framework Part 4 Getting VictimsYoutube UsernamePassword

Q/A Session with instructor and various Social Media availability

OWASP Juice Shop

What is OWASP Juice shop and installation of nodejs and npm

OWASP Juice Shop Optional Reading Material

Issue while installing

OWASP juice shop up in running

Finding the Score Board Level 1 Difficulty Challenge

Zero Star Feedback Level 1 Difficulty Challenge

Access Confidential Document Level 1 Difficulty Challenge

DOM based XSS Level 1 Difficulty Challenge

Error Handling Level 1 Difficulty Challenge

Missing Encoding Level 1 Difficulty Challenge

Bonus Payload DOM XSS Level 1 Difficulty Challenge

Exposed Metrics Level 1 Challenge

Outdated WhiteList Level 1 Challenge

Privacy Policy Level 1 Difficulty Challenge

Repetitive Registration Level 1 Difficulty Challenge

Optional Section

Complete Android Ethical Hacking Practical Course

Q/A Session with instructor and various Social Media availability


Reviews

D
Drake21 February 2021

Thanks so for making this course a beginners to advance course. You explain everything and give us references to learn. You are an amazing tutor.

P
Pratham21 January 2021

English language is not good so not understand so much and not really worth of money not at all good course

S
Saurav16 January 2021

The contents are good...I'm a beginner so...good.....in file upload vulnerability didnt get root permission why?

T
Tanawosh11 January 2021

As I joined in Udemy community I learn all I want, actually am a learner now but by following Udemy courses I hope to achieve my goals! Thanks to Udemy, thanks to talented lecturer! By technology we’re going to make world version 2!

A
Abel9 January 2021

the course was very well delivered and i have learnt alot from the teaching. how i wsih everyone could attaend this course.

A
Athulya9 January 2021

I was a little bit confused about starting, but it was a good start so that I decided to move forward.

S
Snazzy10 November 2020

So far so good. The instructor knows what he is talking about, but he finds it slightly hard to convey it to us students.

D
Daniel7 November 2020

IDK, the instructor have knowledge, I think he has to improve many things, his explanations are a bit vague

I
Ibraheem24 September 2020

My dvwa didnt run well for some errors like incorrect CSFR. I just had to continue the course without practicing dvwa. I hope this OWASP mutillidae won't be a problem too.

M
Munmun23 September 2020

Very interesting course , Everything is very well described . Also i liked the instructor's social Media Handles where he is regularly updating about the course and various travel and tourism places. Overall , it is really a wonderful experience , pretty well explained each and every topic . Looking forward for more such courses in Future .

M
Mehar23 September 2020

Clear explanation for each and every topic and instructor is having good knowledge about the concept . Must go through the reading materials shared by the instructor and videos are very engaging. I am really impressed with the course.

D
Diego23 September 2020

I was seriously searching for such course where i will get all the necessary details in depth , and here i landed up in this course of Mr.Debayan Dey , and the instructor has done a great job indeed ! Everything is very well explained with proper reading materials . The Quizzes and the Assignments are also well organized. I would recommend this to all the Ethical Hacking Enthusiasts to go through this course .

P
Pravallika23 September 2020

I didn’t had any prior experience or knowledge in this area, yet understood everything explained in the video. Thanks Debayan Sir

A
Ayan23 September 2020

This course is really very interesting . Very Engaging course and more importantly the reading materials which instructor has provided , is really very helpful. Also in the course , the difficulty level is gradually increasing which made this course very much different from other courses . Kudos to the Instructor .

A
Ajit22 September 2020

Instructor is having crystal clear knowledge about each and every concept he is teaching and the pace is very good . The best part is the course is getting updated in regular basis as mentioned by the instructor , so this will be an added benefit for taking the course . Really appreciable work.


Coupons

DateDiscountStatus
9/24/2020100% OFFExpired
9/30/2020100% OFFExpired
10/11/2020100% OFFExpired
10/23/2020100% OFFExpired
10/28/2020100% OFFExpired
12/13/2020100% OFFExpired
12/29/2020100% OFFExpired
1/8/2021100% OFFExpired
2/2/2021100% OFFExpired
2/19/2021100% OFFExpired
3/17/2021100% OFFExpired
3/30/2021100% OFFExpired

3489908

Udemy ID

9/10/2020

Course created date

9/24/2020

Course Indexed date
Bot
Course Submitted by