
Do you know that web application pentesters are earning 100's of dollars by submitting bugs to various reputed websites. Now there is a legal way by which you can report bugs and vulnerability to websites and in return you can get reward money.
What is this course about?
This is an ideal course to learn penetration testing from scratch. This course requires no coding skills yet you will be able to perform and create great reports on pentesting for clients. Pentesting is second highest paid job with lots of empty space according to Forbes.
Everyone is learning to create, someone has to take the responsibility to secure that creation.
Penetration testing is a step by step procedure to test an application for various security flaws. These flaws can compromise a website at various levels like database leak, client information leak or may involve monetary leak too.
A lot of new pentester learn a few slings to hack the application but approaching client in a formal way, doing a procedural pentest and documenting a report is a different game. In this course you will learn about all types of vulnerabilities, exploitation of web application, impact of flaws and finally we will cover the steps to write a report.
Traditional companies rely on Firewalls and network security. Attack vectors based on web application will not trigger alarm for it. Specially the new application that are based on CMS like wordpress are getting hacked often. A whole lot ground is covered in this course.
Updates in this course.
You might notice a few small topics being missed out. Web security is a big monster, that is why we have decided to roll out the course and in the mean while we will be updating the course on monthly basis. There will be no charge for extra lecture added but course prize may increase at latter stage.
No coding experience, No Prior Knowledge; Just start your journey as WEB APPLICATION PENTESTER.
Your Instructor

IGNEUS stands for the Revolutionary and a quality enhanced change that we’ve tried to come up with in the modern world of Internet education. We’ve come up bearing in mind the maximum emphasis on the quality dealing with every new technology which has made us distinguished from the throng at internet. And this revolution of choice will keep continuing. Today IGNEUS Technologies has proudly lifting up the tag of being the world's most trusted provider of myriad of services and training programs aiding constantly in every corner of the globe along with web security aspects, and open source technology.
Course Curriculum
-
StartWhat is Pentesting and Web Pentesting. (6:43)
-
StartCommon terminologies in Penetration Testing (5:19)
-
StartBox Based testing: Black Box, White Box and Grey Box (3:21)
-
StartFundamentals of Attacking for Vulnerability Assessment. (8:20)
-
StartTools of Trade for Pentester (5:17)
-
StartSteps to conduct Penetration testing (7:06)
-
StartOWASP top 10 vulnerability and guidelines (8:13)
-
StartWhat we did so far: Summary (1:23)
-
StartWhat is reconnaissance (5:29)
-
Startinitial research about target application (6:01)
-
StartShodan and advanced google research about target (7:24)
-
Startoffline mirror of target site for local testing (5:30)
-
StartICMP - DNS testing and DNS zone transfer (10:35)
-
StartNmap and Zenmap tools (6:02)
-
StartDo not rely completely on tools (3:14)
-
StartWhat we did so far- Summary