All language subtitles for 001 Course Outline.en

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,150 --> 00:00:07,530 Hello, welcome to the Web security and bug bounty course now you've already seen the promo video and 2 00:00:07,530 --> 00:00:12,990 you kind of know what this course is about, but in this video, we want to do a full course outline 3 00:00:12,990 --> 00:00:18,720 so that you know exactly what we're going to learn, so that you have a clear path to success and what 4 00:00:18,720 --> 00:00:20,400 this course is going to give you. 5 00:00:20,730 --> 00:00:27,510 Now, one thing to keep in mind is that this course isn't just for ethical hackers or penetration testers. 6 00:00:27,810 --> 00:00:33,250 We've made this course so that anybody that's interested in Web security can learn from it. 7 00:00:33,600 --> 00:00:39,480 So if you are a web developer that wants to improve their web security, well, this course is for you 8 00:00:39,480 --> 00:00:39,840 as well. 9 00:00:40,020 --> 00:00:46,170 And obviously, if you want to become a bug bounty hunter or a penetration tester, well, this course 10 00:00:46,170 --> 00:00:47,580 is definitely for you as well. 11 00:00:47,910 --> 00:00:48,210 All right. 12 00:00:48,210 --> 00:00:53,450 Let's get into actually what the course is going to look like for you right off the bat. 13 00:00:53,550 --> 00:00:56,310 We're going to start off by creating what we call our virtual. 14 00:00:56,760 --> 00:01:01,980 This is a hacking lab to make sure that we keep our computers safe throughout the course and we can 15 00:01:01,980 --> 00:01:05,390 do different sorts of attacks and experiments on them. 16 00:01:05,400 --> 00:01:11,660 And this course is going to work with any type of system that you have, Linux, Windows, Mac OS, 17 00:01:11,670 --> 00:01:15,180 everything's going to work because we're going to set up this virtual lab for you. 18 00:01:15,870 --> 00:01:19,870 From there, we're going to learn about enumeration and information gathered. 19 00:01:20,160 --> 00:01:24,240 This is where we actually start with the bug bounty and website penetration testing. 20 00:01:24,270 --> 00:01:29,610 We cover numerous topics and tools that allow us to gather as much information about a certain Web site 21 00:01:29,640 --> 00:01:30,380 as possible. 22 00:01:30,840 --> 00:01:33,800 From there, we get into introducing you to burps. 23 00:01:34,170 --> 00:01:37,200 And this is a very important tool of a bug hunter. 24 00:01:37,470 --> 00:01:41,700 And it will set us up for a lot of the topics that we cover later in the course. 25 00:01:42,240 --> 00:01:47,670 We then get into our first but and this first bug on our website, we're going to talk about a Schimel 26 00:01:47,670 --> 00:01:48,170 injection. 27 00:01:48,510 --> 00:01:52,090 It's one of the easier bugs to find and use. 28 00:01:52,350 --> 00:01:53,700 So this is where we start. 29 00:01:54,060 --> 00:01:56,150 But then we get into more complex topics. 30 00:01:56,790 --> 00:02:00,440 For example, we're going to talk about command injections and execution. 31 00:02:01,050 --> 00:02:07,200 This is an extremely dangerous bug where we can inject commands through an input and affect a server 32 00:02:07,200 --> 00:02:07,920 or a system. 33 00:02:08,640 --> 00:02:11,100 We then talk about broken authentication. 34 00:02:11,100 --> 00:02:14,860 What happens when authentication on a Web site is not done properly? 35 00:02:14,940 --> 00:02:18,180 Well, we can take advantage of it and we're going to show you how to do that. 36 00:02:18,420 --> 00:02:24,330 And we're going to use different examples to things like cookie values, HTP requests, forgot password 37 00:02:24,330 --> 00:02:25,460 page and a lot more. 38 00:02:25,680 --> 00:02:29,460 We then get into brute force attacks even if a website is secure. 39 00:02:29,490 --> 00:02:36,420 If we as testers have an easy and simple password set, then it's also going to be easy for us to guess 40 00:02:36,420 --> 00:02:38,520 it using what we call brute force attacks. 41 00:02:38,640 --> 00:02:42,800 And we're going to show you how to prevent brute force attacks as well as show you how they work. 42 00:02:43,650 --> 00:02:46,530 We then talk about broken access control. 43 00:02:46,680 --> 00:02:53,820 Access control enforces policy such as what user can and cannot do or intended permissions for a user. 44 00:02:54,270 --> 00:02:58,200 When that access control is broken, well, we can take advantage of it. 45 00:02:59,040 --> 00:03:02,310 Then we dive into what we call cross site scripting. 46 00:03:02,340 --> 00:03:08,400 This is a very common attack and we're going to talk about all three main types of cross site scripting 47 00:03:08,430 --> 00:03:12,360 which are stored, reflected and DOM based cross site scripting. 48 00:03:12,750 --> 00:03:19,230 Then we dive into one of the most common ways that you can effect a system and probably one of the bigger 49 00:03:19,230 --> 00:03:23,430 vulnerabilities that always comes up, and that is escarole injection. 50 00:03:23,610 --> 00:03:28,510 This is where we're able to access or manipulate the database. 51 00:03:28,680 --> 00:03:31,080 This is probably one of the most important section. 52 00:03:31,320 --> 00:03:36,020 And again, we're going to talk about how we can use it and also how to prevent it. 53 00:03:36,630 --> 00:03:37,560 I know we have a lot. 54 00:03:37,710 --> 00:03:39,750 There's still a few more in this section. 55 00:03:39,750 --> 00:03:47,040 We're going to talk about XML data and how we can use Xixi or XML external entity where it allows an 56 00:03:47,040 --> 00:03:50,790 attacker to interfere with a website that processes XML data. 57 00:03:51,510 --> 00:03:56,280 Finally, we talk about the idea of insufficient logging and monitoring. 58 00:03:56,310 --> 00:04:01,890 You see, to have proper security, you need to have proper logging and monitoring to keep track of 59 00:04:01,890 --> 00:04:07,800 all the requests and information that a page might go through, because this can help us determine whether 60 00:04:07,830 --> 00:04:09,990 a certain attack is taking place or not. 61 00:04:10,000 --> 00:04:14,290 If we don't know when an attack is taking place while then we're just not going to notice it. 62 00:04:14,550 --> 00:04:18,420 So this is another important topic that we left towards the end of the course. 63 00:04:18,840 --> 00:04:21,000 But then probably why you're taking this course. 64 00:04:21,000 --> 00:04:24,900 And the most exciting part is right here, the bug hunting. 65 00:04:25,260 --> 00:04:27,840 So we're going to talk about how to monetize bug hunting. 66 00:04:27,840 --> 00:04:34,740 How can you become an independent researcher that tests Web sites and perhaps collect bug bounty? 67 00:04:35,040 --> 00:04:39,180 Everything that we've learned in this course, we're going to show you how to you can monetize this 68 00:04:39,180 --> 00:04:39,660 knowledge. 69 00:04:40,050 --> 00:04:46,140 And we're going to talk to you about different platforms that you can use to start a career as a bug 70 00:04:46,140 --> 00:04:48,220 hunter, if that's something that you want to do. 71 00:04:48,870 --> 00:04:54,240 Finally, this course is meant for anybody with any sort of programming knowledge. 72 00:04:54,240 --> 00:04:57,720 As a matter of fact, you can take this course without any programming knowledge. 73 00:04:57,750 --> 00:04:59,910 We include bonus material for web. 74 00:04:59,970 --> 00:05:06,510 Developer fundamentals, bonus material on Linux and how to use the Linux terminal and even networking. 75 00:05:06,690 --> 00:05:09,370 The idea is to take you from zero to mastery. 76 00:05:09,830 --> 00:05:16,530 Finally, this course, well, you're in good hands because Alexa is a penetration tester with many 77 00:05:16,530 --> 00:05:17,760 years of experience. 78 00:05:17,760 --> 00:05:24,090 And he's actually worked on discovering vulnerabilities for multiple companies and government systems. 79 00:05:24,120 --> 00:05:29,970 He's going to show you from his professional standpoint how all of this work and how you can actually 80 00:05:29,970 --> 00:05:31,790 apply this in real life. 81 00:05:31,800 --> 00:05:33,450 It's going to be a ton of fun. 82 00:05:33,600 --> 00:05:37,190 And the final thing I want to talk about is our community that we have. 83 00:05:37,320 --> 00:05:42,210 When he joined this course, as always, as part of the Zurda Mastery community, you get to join our 84 00:05:42,210 --> 00:05:47,340 private online discord where we're chatting with people every day, helping each other out, solving 85 00:05:47,340 --> 00:05:52,020 problems, doing challenges together and feeling like you're part of a classroom. 86 00:05:52,170 --> 00:05:55,500 You're going to find myself in it there every day chatting. 87 00:05:55,500 --> 00:06:00,360 And we have a dedicated channel just for this course so that you get to meet other classmates. 88 00:06:00,690 --> 00:06:02,340 All right, that's enough talk. 89 00:06:02,370 --> 00:06:03,780 I think it's time to get started. 90 00:06:04,050 --> 00:06:07,680 Let's dive into the course and let's learn all about Web security. 9953

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.