We may earn an affiliate commission when you visit our partners.
Course image
Ahmed Alassaf

   سوف نتكلم ثغرات عدة مثل xss  idor lfi ssrf multi factor ....etc  وجمع المعلومات بهذا الكورس سوف تكون قادر لكشف اشهر الثغرات الامنية على مواقع حقيقية بطريقة سهلة وبدون تعقيد وسوف تجني المال انت في بيتك  سوف 

تعمل هاكرز اخلاقي الكثييير من المواقع تعمل برامج مكافأات

اتمنى ان تكون سعيد بهذه الدورة سارع ولاتردد

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Learning objectives

  • كشف ثغرات الامنية المشهورة
  • Sql injection ,xss ,file upload,ssrf,graphql,and recon phases

Syllabus

introduction
benefits bug bounty
who am i
hello
Read more
recon phases
اداة مهمة ومفيدة لاستهداف اي شيء وعملة خطة للهجوم
know technology target
enumerate subdomains
find subdomin without any tool
how to use burpsuite
identify waf type
port scanning
Vulnerable Parameter Scanner
brute force directory
EyeWitness recon
Reconnaissance tool for penetration tester
Bug Bounty Methodology – How to Approach a Target
autmote bug bounty
big bounty recon tool
تحديد مالك ip لاي شركة
spf vulnerability
what is spf
spf discovery
spf exploit
no rate limit
explain
poc 1
what is ssrf
xss vulnerability
what is xss types
lab 1
blind xss
live hunting blind xss
poc 2
ssrf to xss
poc 3
Automating XSS using Bash
poc Xiaomi
LFI & RFI vulnerability
ssrf to read internel
lab
poc
AWS retrieve metadata
multifactor bypass
ffmpeg
otp bypass by change response
subdomain takeover
demonstrate
live hunting
ssrf with html pdf
aws bucket takeover live2
bugs
sign up account already registered
weak password policy
password reset link not expire
inactivity timeout
parameter tampering
what is parameter tampering
redis vulnerability
what is redis
redis rce exploit
sql injection
what is sql injection types
poc ssrf
autmote sql injection
sql injection poc
ايجاد sql injection بطريقة سهلة
graphql vulnerability
install lab
graphql idor
graphql injection
graphql Nested dos
Nginx vulnerability
ssrf
ssrf lead to xss poc
cors vulnerabilty
information disclosure
fist bounty get
github dorks lead to leaks
poc2

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Embraces practical, hands-on lab experiences
Designed for learners interested in earning supplemental income
Develops the ability to discover and exploit vulnerabilities
Covers advanced topics like multifactor bypassing and GraphQL injection
Teaches practical methodologies for bug bounty hunting
Emphasis on reconnaissance and information gathering

Save this course

Save احتراف كشف الثغرات الامنية to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in احتراف كشف الثغرات الامنية with these activities:
Review Cybersecurity Fundamentals
Revisit basic cybersecurity concepts to ensure a strong foundation for the course.
Show steps
  • Review fundamental security principles
  • Refresh knowledge on network security protocols and technologies
  • Practice implementing basic security controls
Vulnerability Assessment Peer Review
Collaborate with peers to review and provide feedback on vulnerability assessments, enhancing the quality and accuracy of the findings.
Browse courses on Vulnerability Assessment
Show steps
  • Identify a vulnerability assessment report for review
  • Conduct independent analysis of the report
  • Provide constructive feedback to the author of the report
Vulnerability Scanning for Common Attack Vectors
Utilize tools to conduct vulnerability scans on a target application to identify potential attack vectors.
Browse courses on Vulnerability Scanning
Show steps
  • Select a vulnerability scanner e.g. Nessus, OpenVAS
  • Scan a target website or application
  • Review results and prioritize vulnerabilities based on severity and exploitability
Two other activities
Expand to see all activities and additional details
Show all five activities
Advanced SQL Injection Techniques
Gain a deeper understanding of SQL injection techniques and how to exploit them to compromise databases.
Browse courses on SQL Injection
Show steps
  • Review basic SQL injection techniques
  • Study advanced techniques such as blind SQL injection and time-based attacks
  • Practice exploiting SQL injection vulnerabilities in a lab environment
Bug Bounty Challenge
Participate in a bug bounty program to gain hands-on experience in identifying and reporting vulnerabilities.
Show steps
  • Identify a suitable bug bounty program
  • Review program guidelines and scope
  • Search for vulnerabilities using various techniques
  • Report vulnerabilities according to program requirements

Career center

Learners who complete احتراف كشف الثغرات الامنية will develop knowledge and skills that may be useful to these careers:

Reading list

We haven't picked any books for this reading list yet.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to احتراف كشف الثغرات الامنية.
بناء شبكة كمبيوتر افتراضية من الصفر
Most relevant
إنشاء جداول قاعدة البيانات باستخدام SQL
Most relevant
إنشاء صفحة لنكدين إحترافية
Most relevant
كيفيه انشاء شعار باستخدام GIMP
Most relevant
تصميم مواد مطبوعة للدورات التدريبية بإستعمال موقع كانفا
Most relevant
مقدمة لجداول بيانات جوجل
Most relevant
برنامج تنبيه سطح المكتب باستخدام Python: إشعارات Covid-19
Most relevant
Business Model Canvas للشركات الناشئه
Most relevant
تعلم C عن طريق عمل function تقوم برسم شكل شجرة
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser