Ethical Hacking: Hacking Applications

Video Description

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX.

Product Information

  • Title: Ethical Hacking: Hacking Applications
  • Author(s): Chad Russell
  • Release date: October 2017
  • Publisher(s): Stone River eLearning
  • ISBN: 100000006A0717