loading......

coming soon

Coming Soon

We are in process of building the inventory of good professionals in this category

Got it!

Where do you need ?

location

Please select a Location.

Enquire

Submit your enquiry for Ethical Hacking & Web Application Penetration testing

Please enter valid question or comment

Please enter your name.

Please enter valid email

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With InSEC-Techs

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer

Share

Ethical Hacking & Web Application Penetration testing

Ethical Hacking & Web Application Penetration testing

Online Self Paced Class

7,500

No Reviews Yet
4 Interested

Sample Chapters

Demo 1
Demo 2
Demo 3
Demo 4
Demo 5
Demo 6

About the Course


Ethical Hacking and Web Application Penetration Testing (WAPT) Course is IT Security (Offensive) Security Course thats teaches you how to find vulnerabilities (bugs or loopholes, like coding mistakes, configuration mistakes or errors etc) in any applications and Network infrastructures including networkind devices, mobiles etc. Web Application Penetration is specific to digging the same specific to web applications. In this course you will learn how to find critical information that helps you to hack into computer / applications, later tool, techniques and technologies that help you to penetrate (hack) into your target.Your doubts related to subject will clarified lifetime on my social networking based website

Who should attend

Law Enforcement personell
Security Auditors
PHP, .NET, Java Developers, Netwoking Professionals, Firewall/IDS Specialists
CEO's
Law Firm Agents
Cyber Crime Investigators
Security Analysts
Anyone with basic Computer knowledge
Computer Geeks

Pre-requisites

Just Basic Computer Knowledge

Key Takeaways

Online Exam from InSEC-Techs
PDF Material and Video Updates
Curriculum

Chapter 1 : Ethical Hacking Basics %25252526 System Brush-up

  • Ethical Hacking Demo 33.95PREVIEW

  • Ethical hacking Overview 18.5

  • Linux Basics for Hackers 19.97PREVIEW

  • Windows Commandline Administration 21.15PREVIEW

  • Internet Governence 7.23

Chapter 2 : Lab Setup for HACKING Practice

  • Virtualization 12.93

  • Windows Srver Installation 25.18

  • Ubuntu Installation 11.92

  • Backtrack Installation 11.23

  • Installation Backtrack Tools in Ubuntu 9.28

  • Xampp Intallation for Local Attacks 10.07

  • Vulnerable Website for Practice Attacks -

Chapter 3 : EHacking - Information Gathering

  • Reconnaissance 26.25PREVIEW

  • Google Hacking 18.42

  • Google Hacking - Lab 1.27

  • Scanning & Enumeration 25.68

  • Advanced Port Scanning - Lab 4.78

  • Nmap Scanning Lab 9.32

  • LBD Lab 2.1

  • Scan Lab 2.87

  • DumpSec - Lab 6.72

  • System Hacking Part1 12.12

  • System Hacking Part 2 8.73

  • System Hacking Part 3 8.58

  • System Hacking Part 4 5.08

  • WinCrack Lab 2.32

Chapter 4 : Attacks

  • Proxy Servers 27.48

  • EPS 6.22

  • TOR Proxy 3.67

  • Keyloggers 5.28

  • Trojans 20.4

  • Virus 17.68

  • Social Engineering 15.67

  • Email Hacking 21.72

  • Sniffing 9.4

  • Wireshark 19.38PREVIEW

  • Cain n Able 8.48

Chapter 5 : Web and Misc Attacks

  • Session HIjacking 8.12

  • Session Hijacking 2 5.25

  • Session Hijacking Lab 2.7

  • Web Server Hacking 28.07

  • SQL Injection Part1 6.97

  • SQL INjection Part2 25.07

  • SQL Injection Part 3 25.07

  • XSS Part1 11.32

  • XSS Part2 20.98

  • CSRF Attacks Part1 10.67

  • CSRF Part2 7.17

  • CSRF Part3 2.25

  • File Inclusion Attacks 5.75

Chapter 6 : System %25252525252525252C Mobile and Wireless Attacks

  • Buffer Overflows and Exploit Writing 37.18

  • Reverse Engineering 34.73

  • Cryptography 24.73

  • Firewalls 28.83

  • DOS Attacks Part1 10.32

  • DOS Attacks Part2 7.27

  • Physical Security 8.32

  • Wireless Hacking 11.12

  • Router Hacking 26.52

  • Mobile Hacking 34.6

Chapter 7 : Metaploit and Penetration testing

  • Metasploit Part1 20.88

  • Metasploit Part2 8.3

  • Penetration Testing Part 1 4.75

  • Penetration Testing Part2 10.88

  • Penetration Testing Part3 5.47

Chapter 8 : Web Application Penetration Testing

  • WAPT Part1 11.8

  • WAPT Part2 2.65

  • WAPT Part3 2.8

  • WAPT Part4 8.27

  • WAPT Part5 1.93

  • WAPT Part6 2.17

  • By INSEC-TECHS 1.07PREVIEW

Reviews
There are no Reviews yet. Be the First to Review
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.


You can add upto 6 Images

Ask


There are no Reviews yet. Be the First to Review

Content

Not uploaded yet.

cash back100% Money Back Guarentee

About the Trainer


Kiran Thirukovela Nipun and Srininvas Information Security Consultant Kiran Thirukovela, 31 years old Cyber-techie and Cheif Executive Officer (CEO) of InSEC-Techs (Information Security Technologies) and Hachko.com

Dropped out B-Techs (ECE) by choice and B.SC (Computer Science)and stepped into the world of Computers and networking. Kiran holds IT certification like
MCSA: Microsoft Certified System Administrator
CCNA: Cisco Certified Network Administrator
IINS: Implementing IOS Network Security Expert
CCNP: Cisco Certified Network Professional
CCNP-Sec: Cisco Certified Network Professional Security
CCSP: Cisco Certified SecurityProfessional
AFCEH: Ankit Fadia Certified Ethical Hacker
CHFI: Computer Hacking Forensic Investigator Kiran has authored book "Cyber Crimes Investigation" with co-author Mr. Benild Joseph. A Book written for law enforcement agencies in india. Kiran is Network Security professional with 5+ years of experience and 3+ years of as Ethical Hacking trainer.
He specializes in Web Application security, Penetration testing and Forensic investigation and solved cyber crime cases in India and kenya. Media: http://www.thehindu.com/todays-paper/tp-national/tp-kerala/call-to-ensure-cyber-security/article2111... Nipun Jaswal: Nipun Jaswal is well-known IT security Researcher, Well Known for his activities in the field of ethical hacking and cyber forensics . Mr. Nipun was an Independent security expert , who works on cyber crime cases and investigations , he was the Ex-C.T.O in Secugenius Security Solutions , Also He Worked As A Security Analyst in a Company . During His Career He has Pen-tested over 100+ Servers And Solved Many Cyber Crime Cases ,
He Has Trained Over 5000+ students in the field of ethical hacking and penetration testing , he is the currently the ambassador for EC-COUNCIL Programs In Lovely Professional University (First Indian University To Tie Up With EC-COUNCIL). He is Currently Pursuing Masters In Technology (M.TECH) From LPU Itself . He Has Been The Speaker At Several National Level Confrences . His Security Research Papers Are Published Over Many Sites Like Packetstorm, SourceForge Etc. Also , He Is Currently the admin of Cyber-rog.com , starthack.com , indiancyberpolice.org Achievements of His Careers:

a. Certified Ethical Hacker (EC-COUNCIL C|EH)
b. Certified Information Security Expert (CISE)
c. Ankit Fadia's Certified Ethical Hacker (AFCEH 5.0)
d. Winner Of Innobuzz Best Blog Competition (2010)
e. Ambassador Of EC-COUNCIL @ Lovely Professional University
f. Ex. Chief Technical Officer At Secugenius Security Solutions http://www.secugenius.com
g. Ex. Security Analyst At Cyber Cure Solutions Delhi www.cybercure.in
h. Founder/Admin Of Starthack.com www.starthack.com
i. Founder/Admin Of Indian Cyber Police (Among Most Active HAcker's group of india) forum.indiancyberpolice.org
j. Administrator of RatTechie Forum
k. Admin Of Hacker's Group Ap3x_nd_h4ck0
l. Respected V.I.P Member Of International Hacker's Forum (MADLEETS Pakistan) http://www.madleets.com/User-ap3x-pr3dat0r m. Presenter At HATCON LPU & HATCON KANPUR http://hatcon.in/en/speakers/speakers-at-kanpur/ http://hatcon.in/en/speakers/speakers-at-jalandhar/ n. Presenter At DEFCON Groups (DC141001)

1.Defcon Rajasthan : http://www.defcon.co.in/p/member-and-advisors.html
2. Defcon Punjab : http://www.defconpunjab.com/team.html

o. Presently writing two books On Web application Hacking And Metasploit Framework p. Trained Over 5000 Students And Delivered Over 50+ Workshops q. Worked On Cyber Crime Cases. r. Secured Over 1000 Domains s. Regular Author At Packet Storm Security http://packetstormsecurity.org/files/author/9686/ t. 3+ Years Of Exp. In the Field Of Cyber Security.

Bio: Mr. Srinivas Mr. Srininvas is Security Analyst and Ethical Hacking Trainer Since 6 Years and addressed over 50 workshops and Seminars. He is Co-Author of the Book "Hacking S3crets", along with Sai Satish and Aditya Gupta. http://www.goodreads.com/book/show/16284347-hacking-s3crets https://www.youtube.com/watch?v=dki_vlJ37uA Srininvas is also moderator of famous Hacking Forum based website www.andhrahackers.com and contributed SQL Injection articles to World's leading hacking magazine "hackin9". Srininvas was honoured with "PRATHIBHA" Award by Govt. of Andhra Pradesh in Year 2008.

Students Interested 4

Students Attending-

Course Id: 22522