Ethical Hacking: Hacking Applications


Dive into the field of Cyber Security with this Ethical Hacking: Hacking Applications training course.  Start by understanding network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. By the time you've completed this course, you will know all about XSS attacks, buffer overflows, hacking AJAX and more.

Length: 1.5 hrs

This title is available in the
Total Training All-Access library.

Subscribe Now


With this Ethical Hacking: Hacking Applications training course, you will understand and learn how to secure modern application architecture.

This course is for both beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings globally, and demand is greatly outpacing supply – which means more opportunity, job security, and higher pay for you!


Sample clip


1. Hacking Applications
 Application Architecture and Security (7:56)
 Hamster and Ferret (5:56)
 Morpheus (4:22)
 Heap Spraying Demonstration (4:30)
 OWASP Zed Attack Proxy (12:13)
 Persistent XSS Demo (1:53)
 Buffer Overflow Demonstration (4:36)
 Buffer Overflows Explained (23:18)
 Hacking AJAX (9:25)

Chad Russell has been in the CyberSecurity industry for over 15 years. He has taught Microsoft Engineering courses as a Certified trainer, managed teams of security engineers and analysts for an internet banking provider, and has been an information security consultant working for companies including SAP, Microsoft and Oracle.

He leads and conducts ‘Security Risk Assessments’ for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security, and access management.

Over the past 15 years he has held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications, and has a B.S. in Computer Science from Excelsior College.

You may also like…