【2022年】十大滲透測試課程熱門排行推薦與優惠精選!

 

本文章推薦「Website Hacking / Penetration Testing & Bug Bounty Hunting」、「Linux Privilege Escalation for OSCP & Beyond!」、「Windows Privilege Escalation for OSCP & Beyond!」等相關滲透測試線上課程,讓您滿足學習的慾望。

你是否想透過線上學習得到更多的技能,增加自己的技能樹?現在是學生的您,透過線上學習可以將更多專業知識用在課業學習上更加強所學。還是您是朝九晚五的上班族,尋找可以為工作上帶來更上一層樓的技能?或您是因為興趣或想培養其他興趣?

線上課程不受地理位置影響,不受時間早晚影響,老師來自世界各地,也不受學習程度影響的特色,讓您無時無刻想學都可以,想多看幾次增加熟悉度也可以。不同領域的老師將針對不同主題滿足您的學習目的,推薦的課程項目會陸續更新,絕對提供您最熱門人氣高的線上課程。

  • 線上課程老師來自於全球,文章推薦的熱門課程除了繁中課程以外還會有機會看到簡中和英文課程,可以針對自己喜好挑選。
  • 呈現的價錢會因為一些活動而有折扣,但折扣有可能一段時間後結束而調整回原價,最終價錢煩請到課程頁面進行確認。





滲透測試課程總覽

為了節省您的時間,本列表整理每個課程精要,讓您可以快速瀏覽這文章所提供的課程是否是您所需要的,點選您有興趣課程的「課程名稱」或「課程圖示」可以進一步跳到文章所屬課程的介紹區塊瞭解更多資訊。

課程名稱Website Hacking / Penetration Testing & Bug Bounty HuntingPython for Penetration TestersPenetration Testing with KALI and More: All You Need to KnowPython 3 For Offensive PenTest: A Complete Practical CourseTOTAL: CompTIA PenTest+ (Ethical Hacking) + 2 FREE Tests.Hacking Web Applications and Penetration Testing: Fast StartWindows Privilege Escalation for OSCP & Beyond!Linux Privilege Escalation for OSCP & Beyond!Mobile Penetration Testing of Android ApplicationsLearn Ethical Hacking from Entry to Expertise
課程圖示
1

Website Hacking / Penetration Testing & Bug Bounty Hunting

2

Python for Penetration Testers

3

Penetration Testing with KALI and More: All You Need to Know

4

Python 3 For Offensive PenTest: A Complete Practical Course

5

TOTAL: CompTIA PenTest+ (Ethical Hacking) + 2 FREE Tests.

6

Hacking Web Applications and Penetration Testing: Fast Start

7

Windows Privilege Escalation for OSCP & Beyond!

8

Linux Privilege Escalation for OSCP & Beyond!

9

Mobile Penetration Testing of Android Applications

10

Learn Ethical Hacking from Entry to Expertise

課程原價NT$ 2,690NT$ 2,690NT$ 590NT$ 2,690NT$ 2,690NT$ 2,690NT$ 790NT$ 790NT$ 2,690NT$ 590
課程售價NT$ 390NT$ 390NT$ 390NT$ 390NT$ 390NT$ 390NT$ 390NT$ 390NT$ 390NT$ 430
課程評價(人數)4.6 分(12,250 個評分)4.3 分(1,109 個評分)4.4 分(908 個評分)4.7 分(1,411 個評分)4.6 分(1,212 個評分)4.3 分(1,411 個評分)4.7 分(1,994 個評分)4.7 分(2,245 個評分)4.1 分(890 個評分)4.3 分(555 個評分)
課程時長10 小時2 小時6.5 小時5 小時11 小時4 小時 小時1.5 小時6 小時49 小時
學生人數81,427 人56,994 人44,420 人15,134 人11,674 人10,812 人8,104 人7,772 人6,737 人3,340 人
課程特色Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts.Hacking with PythonEthical Hacking with KALI LINUXUpdated Python 3.7 / Windows 10 & Kali 2. Learn how to use python for ethical hacking and penetration testingFrom Total Seminars: Michael Solomon on ethical hacking & high-level penetration testing. Hack like a pro.Learn main aspects of Ethical Web Hacking, Penetration Testing and prevent vulnerabilities with this course | EthicalFinding and exploiting Windows vulnerabilities and misconfigurations to gain an administrator shell.Finding and exploiting Linux vulnerabilities and misconfigurations to gain a root shell.Computer security is no more about PCs. Is your TV, fridge and mobile phone. Learn to audit mobile apps!5 Courses Bundle to Make You Expertise in Hacking from basics to advanced levels of Web & mobile apps pen-testing.
連結UdemyUdemyUdemyUdemyUdemyUdemyUdemyUdemyUdemyUdemy



滲透測試課程介紹

推薦的課程以倒序的方式呈現,越往下查看會看到越熱門的,期望您能找到滿意的學習主題!

10

Learn Ethical Hacking from Entry to Expertise

5 Courses Bundle to Make You Expertise in Hacking from basics to advanced levels of Web & mobile apps pen-testing.
NT$ 590
NT$ 430

點擊看Udemy

課程老師InSEC- Techs
課程評價4.3 分(555 個評分)
課程時長49 小時
學生人數3,340 人

課程介紹

This course is 5 courses bundled as single course title “Learn Ethical Hacking: Entry to Expertise Level: 5 Courses Pack” the biggest Course to Make You MASTERS in Hacking,Courses covers from basics to advanced levels of Web & mobile apps pen-testing

瞭解更多細節

哪些人適合這堂課?

  • Anyone with basic knowledge of computers
  • Anyone who want to make careen in Hacking/PenTesting domain.
  • Anyone who want to explore the knowledge on Cyber Security.

學習目標

  • You will learn Linux and Windows CLI Tutorials
  • You will learn from basics to ADVANCED level of Ethical Hacking course to become Professional Penetration Tester
  • You will learn & Expertise WiFi Hacking in Depth
  • You will learn Hacking / pentesting web sites & server (in WAPT Course)
  • You will learn Metasploit (Basics to advanced Level)
  • You will learn mobile apps (Android & iOS ) penetration testing
  • You will learn total 5 courses.
  • You will become pro Pen-Tester with all skills to handle Penetration Testing projects as an employee or Freelancer.

關注這課程的人也購買了這些…

9

Mobile Penetration Testing of Android Applications

Computer security is no more about PCs. Is your TV, fridge and mobile phone. Learn to audit mobile apps!
NT$ 2,690
NT$ 390

點擊看Udemy

課程老師Gabriel Avramescu
課程評價4.1 分(890 個評分)
課程時長6 小時
學生人數6,737 人

課程介紹

You already know some computer and network ethical hacking? What about moving forward and applying it to mobile apps as well? This course is for the beginners and may be useful for some advanced users as well.

Android Hacking and Penetration Testin

瞭解更多細節

哪些人適合這堂課?

  • penetration testers, security professionals and amateurs
  • web and mobile application developers
  • security enthusiasts

學習目標

  • Learn to audit or perform penetration tests agains Android applications
  • Learn tools and techniques
  • Perform real world attacks on Android Devices and Apps
  • Perform Certification Pinning bypass for most of Android Apps
  • Explore OWASP Top Ten Mobile and Web most common vulnerabilities
  • Android Malware Analysis

關注這課程的人也購買了這些…



8

Linux Privilege Escalation for OSCP & Beyond!

Finding and exploiting Linux vulnerabilities and misconfigurations to gain a root shell.
NT$ 790
NT$ 390

點擊看Udemy

課程老師Tib3rius ⁣
課程評價4.7 分(2,245 個評分)
課程時長1.5 小時
學生人數7,772 人

課程介紹

This course teaches privilege escalation in Linux, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (170+), and an intentionally mi

瞭解更多細節

哪些人適合這堂課?

  • Beginner and intermediate ethical hackers.
  • Students currently taking or planning to take the PWK/OSCP course.

學習目標

  • Multiple methods for escalating privileges on a Linux system.
  • In depth explanations of why and how these methods work.
  • Tools which can help identify potential privilege escalation vulnerabilities on a Linux system.
  • A free intentionally vulnerable Debian Linux VM to practice privilege escalation on.

關注這課程的人也購買了這些…

7

Windows Privilege Escalation for OSCP & Beyond!

Finding and exploiting Windows vulnerabilities and misconfigurations to gain an administrator shell.
NT$ 790
NT$ 390

點擊看Udemy

課程老師Tib3rius ⁣
課程評價4.7 分(1,994 個評分)
課程時長 小時
學生人數8,104 人

課程介紹

This course teaches privilege escalation in Windows, from basics such as how permissions work, to in-depth coverage and demonstrations of actual privilege escalation techniques. The course comes with a full set of slides (150+), and a script which ca

瞭解更多細節

哪些人適合這堂課?

  • Beginner and intermediate ethical hackers.
  • Students currently taking or planning to take the PWK/OSCP course.

學習目標

  • Multiple methods for escalating privileges on a Windows system.
  • In depth explanations of why and how these methods work.
  • Tools which can help identify potential privilege escalation vulnerabilities on a Windows system.
  • A setup script you can run on a (free) trial version of Windows 10, creating an intentionally vulnerable VM to practice privilege escalation on.

關注這課程的人也購買了這些…



6

Hacking Web Applications and Penetration Testing: Fast Start

Learn main aspects of Ethical Web Hacking, Penetration Testing and prevent vulnerabilities with this course | Ethical
NT$ 2,690
NT$ 390

點擊看Udemy

課程老師Muharrem AYDIN
課程評價4.3 分(1,411 個評分)
課程時長4 小時
學生人數10,812 人

課程介紹

Welcome to the “Ethical Hacking Web Applications and Penetration Testing: Fast Start!”

This course is for the beginners, so you don’t need to have a previous knowledge about hacking, penetration testing, or application development. You’ll learn how

瞭解更多細節

哪些人適合這堂課?

  • Anyone who wants to learn how to hack or harden a website.
  • Anyone who is curious about how data is leaked from social media environments
  • Anyone who wants to learn how even the most secure web sites are hacked
  • Anyone who is afraid of being hacked and would like to secure his/her websites
  • People who are willing to make a career in Cyber Security

學習目標

  • Ethical hacking is a good career because it is one of the best ways to test a network. An ethical hacker tries to locate vulnerabilities in the network by testing different hacking techniques on them. In many situations, a network seems impenetrable only because it hasn’t succumbed to an attack in years. However, this could be because black hat hackers are using the wrong kinds of methods. An ethical hacker can show a company how they may be vulnerable by levying a new type of attack that no one has ever tried before. When they successfully penetrate the system, the organization can then set up defenses to protect against this kind of penetration. This unique security opportunity makes the skills of an ethical hacker desirable for organizations that want to ensure their systems are well-defended against cybercriminals.
  • Ethical hacking involves a hacker agreeing with an organization or individual who authorizes the hacker to levy cyber attacks on a system or network to expose potential vulnerabilities. An ethical hacker is also sometimes referred to as a white hat hacker. Many depend on ethical hackers to identify weaknesses in their networks, endpoints, devices, or applications. The hacker informs their client as to when they will be attacking the system, as well as the scope of the attack. An ethical hacker operates within the confines of their agreement with their client. They cannot work to discover vulnerabilities and then demand payment to fix them. This is what gray hat hackers do. Ethical hackers are also different from black hat hackers, who hack to harm others or benefit themselves without permission.
  • In addition to proficiency in basic computer skills and use of the command line, ethical hackers must also develop technical skills related to programming, database management systems (DBMS), use of the Linux operating system (OS), cryptography, creation and management of web applications and computer networks like DHCP, NAT, and Subnetting. Becoming an ethical hacker involves learning at least one programming language and having a working knowledge of other common languages like Python, SQL, C++, and C. Ethical hackers must have strong problem-solving skills and the ability to think critically to come up with and test new solutions for securing systems. Ethical hackers should also understand how to use reverse engineering to uncover specifications and check a system for vulnerabilities by analyzing its code.
  • Many hackers use the Linux operating system (OS) because Linux is a free and open-source OS, meaning that anyone can modify it. It’s easy to access and customize all parts of Linux, which allows a hacker more control over manipulating the OS. Linux also features a well-integrated command-line interface, giving users a more precise level of control than many other systems offer. While Linux is considered more secure than many other systems, some hackers can modify existing Linux security distributions to use them as hacking software. Most ethical hackers prefer Linux because it’s considered more secure than other operating systems and does not generally require the use of third-party antivirus software. Ethical hackers must be well-versed in Linux to identify loopholes and combat malicious hackers, as it’s one of the most popular systems for web servers.
  • Ethical hacking is legal because the hacker has full, expressed permission to test the vulnerabilities of a system. An ethical hacker operates within constraints stipulated by the person or organization for which they work, and this agreement makes for a legal arrangement. An ethical hacker is like someone who handles quality control for a car manufacturer. They may have to try to break certain components of the vehicle such as the windshield, suspension system, transmission, or engine to see where they are weak or how they can improve them. With ethical hacking, the hacker is trying to “break” the system to ascertain how it can be less vulnerable to cyberattacks. However, if an ethical hacker attacks an area of a network or computer without getting expressed permission from the owner, they could be considered a gray hat hacker, violating ethical hacking principles.
  • The different types of hackers include white hat hackers who are ethical hackers and are authorized to hack systems, black hat hackers who are cybercriminals, and grey hat hackers, who fall in-between and may not damage your system but hack for personal gain. There are also red hat hackers who attack black hat hackers directly. Some call new hackers green hat hackers. These people aspire to be full-blown, respected hackers. State-sponsored hackers work for countries and hacktivists and use hacking to support or promote a philosophy. Sometimes a hacker can act as a whistleblower, hacking their own organization in order to expose hidden practices. There are also script kiddies and blue hat hackers. A script kiddie tries to impress their friends by launching scripts and download tools to take down websites and networks. When a script kiddie gets angry at…
  • Whether you want to get your first job in IT security, become a white hat hacker, or prepare to check the security of your own home network, Udemy offers practical and accessible ethical hacking courses to help keep your networks safe from cybercriminals
  • Penetration testing skills make you a more marketable IT tech. Understanding how to exploit servers, networks, and applications means that you will also be able to better prevent malicious exploitation. From website and network hacking, to pen testing in Python and Metasploit, Udemy has a course for you.
  • Penetration tests have five different stages. The first stage defines the goals and scope of the test and the testing methods that will be used. Security experts will also gather intelligence on the company’s system to better understand the target. The second stage of a pen test is scanning the target application or network to determine how they will respond to an attack. You can do this through a static analysis of application code and dynamic scans of running applications and networks. The third stage is the attack phase, when possible vulnerabilities discovered in the last stage are attacked with various hacking methods. In the fourth stage of a penetration test, the tester attempts to maintain access to the system to steal any sensitive data or damaging systems. The fifth and final stage of a pen test is the reporting phase, when testers compile the test results.
  • There are many types of penetration testing. Internal penetration testing tests an enterprise’s internal network. This test can determine how much damage can be caused by an employee. An external penetration test targets a company’s externally facing technology like their website or their network. Companies use these tests to determine how an anonymous hacker can attack a system. In a covert penetration test, also known as a double-blind penetration test, few people in the company will know that a pen test is occurring, including any security professional. This type of test will test not only systems but a company’s response to an active attack. With a closed-box penetration test, a hacker may know nothing about the enterprise under attack other than its name. In an open-box test, the hacker will receive some information about a company’s security to aid them in the attack.
  • Penetration testing, or pen testing, is the process of attacking an enterprise’s network to find any vulnerabilities that could be present to be patched. Ethical hackers and security experts carry out these tests to find any weak spots in a system’s security before hackers with malicious intent find them and exploit them. Someone who has no previous knowledge of the system’s security usually performs these tests, making it easier to find vulnerabilities that the development team may have overlooked. You can perform penetration testing using manual or automated technologies to compromise servers, web applications, wireless networks, network devices, mobile devices, and other exposure points.
  • Set up a virtual environment to practice without affecting main systems
  • Install Kali Linux – a penetration testing Debian distro
  • Install virtual system which has vulnerable web applications
  • Basic terms, standards, services, protocols and technologies
  • HTTP protocol, requests and responses
  • HTTPS, TLS/SSL
  • Intercepting HTTP traffic using a personal proxy
  • Gather sensitive information in websites
  • Find known vulnerabilities using vulnerability database
  • Find known vulnerabilities using search engines
  • Google Hack Database (GHDB)
  • Discover unpublished directories and files associated with a target website
  • Input and output manipulation
  • Input and output validation approaches
  • Discover and exploit reflected XSS vulnerabilities
  • Discover and exploit stored XSS vulnerabilities
  • Discover DOM-based XSS vulnerabilities
  • Prevent XSS vulnerabilities
  • Discover and exploit SQL injection vulnerabilities, and prevent them
  • Bypass login mechanisms using SQL injections and login a website without password
  • Find more in a database using SQL injection vulnerabilities: databases, tables and sensitive data such as passwords
  • Discover & exploit blind SQL injections
  • Prevent SQL injections
  • Authentication methods and strategies
  • Bypass authentication mechanisms
  • Find unknown usernames and passwords: brute force & dictionary attacks
  • Launch a dictionary attack
  • Access unauthorized processes
  • Escalate privileges
  • Access sensitive data using path traversal attack
  • Session management mechanism
  • Impersonating victim by session fixation attack
  • Discover and exploit CSRF (Cross Site Request Forgery)

關注這課程的人也購買了這些…

5

TOTAL: CompTIA PenTest+ (Ethical Hacking) + 2 FREE Tests.

From Total Seminars: Michael Solomon on ethical hacking & high-level penetration testing. Hack like a pro.
NT$ 2,690
NT$ 390

點擊看Udemy

課程老師Total Seminars • 750,000+ Enrollments
課程評價4.6 分(1,212 個評分)
課程時長11 小時
學生人數11,674 人

課程介紹

Mike Meyers and the Total Seminars Team, your source for best-selling cybersecurity courses, brings you this ethical hacking and penetration testing course with your instructor Michael Solomon, Ph.D., CISSP, PMP, CISM. Prepare for the CompTIA PenTest

瞭解更多細節

哪些人適合這堂課?

  • Anyone interested in ethical hacking, pen testing, vulnerability testing, and network security
  • Anyone looking to prepare for the CompTIA PenTest+ (PT0-001) exam
  • Security Analysts, Network Security Ops, Application Security Vulnerability Analysts

學習目標

  • Includes 2 Bonus Practice Exams. We have added a CompTIA PenTest+ Practice Test and a Certified Ethical Hacker CEH Practice Test.
  • How to plan and scope a penetration test as a contracted pen tester for a client (as an ethical hacker, you’ll be the good guy and get paid to hack networks!)
  • How to work within a virtual environment to practice your pen testing skills, including using Oracle VM manager, Kali Linux, Metasploitable, and DVWA
  • Where to find vulnerabilities and how to penetrate a network in order to run exploits, then how to report those vulnerabilities to the client for remediation
  • How to gather intel on a network by scanning and enumerating (finding) targets, then searching out the weak points on those targets
  • Understand social engineering attacks, exploit network-based vulnerabilities, and intercept traffic via man-in-the-middle (MITM) attacks
  • How to use pen testing tools like Nmap, Nessus, Nslookup, John the Ripper, Immunity Debugger, Aircrack-NG, Wireshark, and many more
  • How to write reports, explain post-delivery activities, and recommend remediation strategies to your client

關注這課程的人也購買了這些…



4

Python 3 For Offensive PenTest: A Complete Practical Course

Updated Python 3.7 / Windows 10 & Kali 2. Learn how to use python for ethical hacking and penetration testing
NT$ 2,690
NT$ 390

點擊看Udemy

課程老師Hussam Khrais
課程評價4.7 分(1,411 個評分)
課程時長5 小時
學生人數15,134 人

課程介紹

When other’s tools fail, writing your own makes you a true penetration tester!
—————         

Before You Enroll !

The knowledge which you will learn from this course is literally a weapon. My goal is to make you a better warrior in penetr

瞭解更多細節

哪些人適合這堂課?

  • Ethical hackers and penetration testers
  • Students preparing for OSCP, OSCE, GPEN, GXPN, CEH
  • Information security professionals and cyber security consultants
  • System and network security administrators
  • Programmers who want to get their hands dirty

學習目標

  • Learn how to code your own reverse shell [TCP+HTTP]
  • Learn how to exfiltrate data from your target
  • Make anonymous shell by interacting with [Twitter, Google Form, Sourceforge]
  • Replicate Metasploit features and and make an advanced shell
  • Learn how to hack passwords using multiple techniques [Keylogger, Clipboard Hijacking]
  • Learn how malware abusing cryptography by adding [AES,RSA,XOR] encryption to your shell
  • Privilege escalation on windows with practical example

關注這課程的人也購買了這些…

3

Penetration Testing with KALI and More: All You Need to Know

Ethical Hacking with KALI LINUX
NT$ 590
NT$ 390

點擊看Udemy

課程老師Mohamad Mahjoub
課程評價4.4 分(908 個評分)
課程時長6.5 小時
學生人數44,420 人

課程介紹

Welcome to this comprehensive course on penetration testing with KALI. The course examines the various penetration testing concepts and techniques employed in a modern ubiquitous computing world, and will take you from a beginner to a more advanced l

瞭解更多細節

哪些人適合這堂課?

  • Anyone who wants to learn how to secure their systems from hacker
  • Anyone who wants to learn how hackers can attack their computer systems
  • Anyone looking to become a penetration tester (From zero to hero)
  • Computer Science, Computer Security, and Computer Engineering Students

學習目標

  • Learn simplified ethical hacking techniques from scratch
  • Perform an actual Mobile attack
  • Master 2 smart techniques to crack into wireless networks
  • Learn more than 9 ways to perform LAN attacks
  • Learn Linux basics
  • Learn 10+ web application attacks
  • Learn more than 5 proven methods of Social Engineering attacks
  • Obtain 20+ skills any penetration tester needs to succeed
  • Make better decisions on how to protect your applications and network
  • Upgrade your information security skills for a new job or career change
  • Learn how to write a professional penetration testing report
  • Course is constantly being updated, so the knowledge you will acquire will always be applicable

關注這課程的人也購買了這些…



2

Python for Penetration Testers

Hacking with Python
NT$ 2,690
NT$ 390

點擊看Udemy

課程老師Cristi Zot
課程評價4.3 分(1,109 個評分)
課程時長2 小時
學生人數56,994 人

課程介紹

You’re a programmer and you want to get into cybersecurity. You’re in the right place because this course will teach you how to combine or use Python programming to greatly expand your skills as a cybersecurity professional.

Penetration testers and

瞭解更多細節

哪些人適合這堂課?

  • Developers who wants to break into cybersecurity and penetration testing.
  • Cybersecurity professionals with basic Python skills who want to get their work done more efficiently.
  • Anyone with basic coding skills who wants to learn Python for penetration testing.

學習目標

  • How to use Python in Penetration Testing and Cybersecurity.

關注這課程的人也購買了這些…

1

Website Hacking / Penetration Testing & Bug Bounty Hunting

Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts.
NT$ 2,690
NT$ 390

點擊看Udemy

課程老師Zaid Sabih
課程評價4.6 分(12,250 個評分)
課程時長10 小時
學生人數81,427 人

課程介紹

Note: The contents of this course are not covered in any of my other courses except for some basics. Although website hacking is covered in one of my other courses, that course only covers the basics where this course dives much deeper in this topic

瞭解更多細節

哪些人適合這堂課?

  • Anybody interested in learning website & web application hacking / penetration testing.
  • Anybody interested in becoming a bug bounty hunter.
  • Anybody interested website hacking.
  • Anybody interested in learning how to secure websites & web applications from hacker.
  • Web developers so they can create secure web application & secure their existing ones.
  • Web admins so they can secure their websites.

學習目標

  • 90+ Videos to take you from a beginner to advanced in website hacking.
  • Create a hacking lab & needed software (on Windows, OS X and Linux).
  • Become a bug bounty hunters & discover bug bounty bugs!
  • Discover, exploit and mitigate a number of dangerous web vulnerabilities.
  • Exploit these vulnerabilities to hack into web servers.
  • Bypass security & advanced exploitation of these vulnerabilities.
  • Advanced post exploitation – hack other websites on the same server, dump the database, privilege escalation….etc
  • Bypass security & filters.
  • Intercept requests using a proxy.
  • Adopt SQL queries to discover and exploit SQL injections in secure pages.
  • Gain full control over target server using SQL injections.
  • Discover & exploit blind SQL injections.
  • Install Kali Linux – a penetration testing operating system.
  • Learn linux commands and how to interact with the terminal.
  • Learn linux basics.
  • Understand how websites & web applications work.
  • Understand how browsers communicate with websites.
  • Gather sensitive information about websites.
  • Discover servers, technologies & services used on target website.
  • Discover emails & sensitive data associated with a specific website.
  • Find all subdomains associated with a website.
  • Discover unpublished directories & files associated with a target website.
  • Find all websites hosted on the same server as the target website.
  • Discover, exploit and fix file upload vulnerabilities.
  • Exploit advanced file upload vulnerabilities & gain full control over the target website.
  • Discover, exploit and fix code execution vulnerabilities.
  • Exploit advanced code execution vulnerabilities & gain full control over the target website.
  • Discover, exploit & fix local file inclusion vulnerabilities.
  • Exploit local file inclusion vulnerabilities to to get a shell.
  • Exploit advanced local file inclusion vulnerabilities & gain full control over the target website.
  • Exploit advanced remote file inclusion vulnerabilities & gain full control over the target website.
  • Discover, fix, and exploit SQL injection vulnerabilities.
  • Bypass login forms and login as admin using SQL injections.
  • Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords using SQL injections
  • Bypass filtering, and login as admin without password using SQL injections.
  • Bypass filtering and security measurements.
  • Read / Write files to the server using SQL injections.
  • Patch SQL injections quickly.
  • Learn the right way to write SQL queries to prevent SQL injections.
  • Discover basic & advanced reflected XSS vulnerabilities.
  • Discover basic & advanced stored XSS vulnerabilities.
  • How to use BeEF framwork.
  • Hook users to BeEF using reflected & XSS vulnerabilities.
  • Steal credentials from hooked targets.
  • Run javascript code on hooked targets.
  • Create undetectable backdoors.
  • Hack computers using XSS vulnerabilities.
  • Fix XSS vulnerabilities & protect yourself from them as a user.
  • What do we mean by brute force & wordlist attacks.
  • Create a wordlist or a dictionary.
  • Launch a wordlist attack and guess admin’s password.
  • Discover all of the above vulnerabilities automatically using a web proxy.
  • Run system commands on the target webserver.
  • Access the file system (navigate between directories, read/write files).
  • Download, upload files.
  • Bypass security measurements.
  • Access all websites on the same webserver.
  • Connect to the database and execute SQL queries or download the whole database to the local machine.
  • Discover, exploit and mitigate CSRF vulnerabilities.

關注這課程的人也購買了這些…



滲透測試課程總覽

看完了一連串課程的介紹後,你是否還想要再一次進行課程總比較呢?

課程名稱Website Hacking / Penetration Testing & Bug Bounty HuntingPython for Penetration TestersPenetration Testing with KALI and More: All You Need to KnowPython 3 For Offensive PenTest: A Complete Practical CourseTOTAL: CompTIA PenTest+ (Ethical Hacking) + 2 FREE Tests.Hacking Web Applications and Penetration Testing: Fast StartWindows Privilege Escalation for OSCP & Beyond!Linux Privilege Escalation for OSCP & Beyond!Mobile Penetration Testing of Android ApplicationsLearn Ethical Hacking from Entry to Expertise
課程圖示
1

Website Hacking / Penetration Testing & Bug Bounty Hunting

2

Python for Penetration Testers

3

Penetration Testing with KALI and More: All You Need to Know

4

Python 3 For Offensive PenTest: A Complete Practical Course

5

TOTAL: CompTIA PenTest+ (Ethical Hacking) + 2 FREE Tests.

6

Hacking Web Applications and Penetration Testing: Fast Start

7

Windows Privilege Escalation for OSCP & Beyond!

8

Linux Privilege Escalation for OSCP & Beyond!

9

Mobile Penetration Testing of Android Applications

10

Learn Ethical Hacking from Entry to Expertise

課程原價NT$ 2,690NT$ 2,690NT$ 590NT$ 2,690NT$ 2,690NT$ 2,690NT$ 790NT$ 790NT$ 2,690NT$ 590
課程售價NT$ 390NT$ 390NT$ 390NT$ 390NT$ 390NT$ 390NT$ 390NT$ 390NT$ 390NT$ 430
課程評價(人數)4.6 分(12,250 個評分)4.3 分(1,109 個評分)4.4 分(908 個評分)4.7 分(1,411 個評分)4.6 分(1,212 個評分)4.3 分(1,411 個評分)4.7 分(1,994 個評分)4.7 分(2,245 個評分)4.1 分(890 個評分)4.3 分(555 個評分)
課程時長10 小時2 小時6.5 小時5 小時11 小時4 小時 小時1.5 小時6 小時49 小時
學生人數81,427 人56,994 人44,420 人15,134 人11,674 人10,812 人8,104 人7,772 人6,737 人3,340 人
課程特色Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts.Hacking with PythonEthical Hacking with KALI LINUXUpdated Python 3.7 / Windows 10 & Kali 2. Learn how to use python for ethical hacking and penetration testingFrom Total Seminars: Michael Solomon on ethical hacking & high-level penetration testing. Hack like a pro.Learn main aspects of Ethical Web Hacking, Penetration Testing and prevent vulnerabilities with this course | EthicalFinding and exploiting Windows vulnerabilities and misconfigurations to gain an administrator shell.Finding and exploiting Linux vulnerabilities and misconfigurations to gain a root shell.Computer security is no more about PCs. Is your TV, fridge and mobile phone. Learn to audit mobile apps!5 Courses Bundle to Make You Expertise in Hacking from basics to advanced levels of Web & mobile apps pen-testing.
連結UdemyUdemyUdemyUdemyUdemyUdemyUdemyUdemyUdemyUdemy



從老師查找更多課程

以上推薦的課程還沒挑到自己有興趣的嗎?
還是您有熱衷某個老師開的課程呢?
本頁除了提供滲透測試的課程以外,也列出這些課程所屬的老師的主要資訊頁,您可以從下列選單中了解更多相關介紹或看他們開的其他課程,期望您最終能找到自己想學習的項目。



【2022年】十大滲透測試課程熱門排行推薦與優惠精選!

參考其他網路與安全性線上課程

除了本文介紹的課程種類以外,想要瞭解網路與安全性領域還有哪些不同類型的課程值得一探究竟嗎?讓您可以從不同面向更紮實的學習,點擊參考以下其他熱門主題文章。絕對提供您最優惠人氣滿檔的課程,歡迎繼續延伸閱讀。


Tagged on: