My name is Venkatesh, I am a Penetration Tester and a Computer Security Expert. I love hacking but in an ethical hackers perspective. I have a huge experience as a penetration tester, I have consulted different companies in the security field which includes global banks and other IT sectors. I love to Teach and I love to know and share more information related to Cyber security.
I have listed out my cybersecurity courses below:
In this course, you will be learning about
- Web Application Penetration Testing - Overview
- Types of Web Application Security Testing
- Approach for Web App Penetration Testing
- Maintaining Your Issue Findings
- Setting Up your Lab for web application penetration testing
- 101 - Web Application
- Complete Guide On Burp Suite
- Detailed Information Gathering
- Broken Session Management
- Unsanitized Data - XSS (Cross-Site Scripting Attack)
- HTML Injection Vulnerability
- Different Injection Attacks
- Cross-Site Request Forgery
- Server-Side Request Forgery
- Complete Guide on SQL Injection Vulnerability
- File Inclusion Vulnerability - LFI & RFI
- File Upload vulnerability
- Insecure Direct Object Reference - IDOR
- Open URL Redirection Vulnerability
- OS Command injection
- HTTP Parameter Pollution
- Parameter Tampering
- XML External Entity Vulnerability
Course Link:
In this course, you will be learning about
- Introduction to Hacking
- Setting up your hacking lab
- Final preparation to begin attacks
- Reconnaissance
- Scanning networks
- Vulnerability Assessment
- NGROK
- Network Sniffing
- Hashes and Passwords
- Hacking System using Metasploit
- Social Engineering Attacks
- Hacking Android Phones
- Web Application Attacks
- Cleaning Up and Getting Out
Course Link:
Source | Links |
---|---|
Course | https://www.udemy.com/course/complete-hands-on-ethical-hacking/ |
Coupon | https://www.udemy.com/course/complete-hands-on-ethical-hacking/?couponCode=LUFFMANPROXY |
In this course, you will be learning completely about Metasploit. One of the best exploitation in the market.
- Introduction to Metasploit
- Setting Up Your Environment
- Metasploit Components and Environment
- Information Gathering with Metasploit
- Hunting for Vulnerability with Metasploit
- Server-side Exploitation Attacks
- Client-Side Exploitation Attacks
- Post Exploitation Attacks
- Hacking into Android Phones
- Automating Metasploit using Scripting
- Metasploit For Secret Agents
- Web application Scanning with Metasploit
- Anti Forensics
Course Link:
In this course, you will learn about the following topics
- About Netcat
- Netcat Installation
- Different types of Netcat
- Making chat interface - encrypted and non-encrypted
- File Transfers
- Port Scanning Techniques
- Banner Grabbing Techniques
- Reverse Shell Techniques
- Bind Shell Techniques
- Advanced Reverse Shell Techniques
- Netcat Without Netcat
- Attacking Outside Network
- Setting Proxy Relay
- NGROK
- Access Control
- Advanced Pipe Techniques
- Using SSL Certificates
- Exfiltration Attacks
- Remote Command Execution
Course Link: