Hacking and securing modern applications
Hacking Modern Applications
Understanding and securing modern application architecture
This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately.
You will start by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret.
Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX.
This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!
There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!
Each chapter closes with exercises putting your new learned skills into practical use immediately.
Stone River eLearning
At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered.
Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses.
We currently offer 800+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month.
A subscription option is available for those with a real passion for learning.
·
Application
Architecture and Security SYLLABUS
· Hamster and
Ferret
Morpheus
Heap Spraying Demonstration
OWASP Zed Attack Proxy
Persistent XSS Demo
Buffer Overflow Demonstration
Buffer Overflows Explained
Hacking AJAX
Comments
Post a Comment