We may earn an affiliate commission when you visit our partners.
Troy Hunt

"Hack Yourself First" is all about developers building up cyber-offense skills and proactively seeking out security vulnerabilities in their own websites before an attacker does.

The prevalence of online attacks against websites has accelerated quickly in recent years and the same risks continue to be readily exploited. However, these are very often easily identified directly within the browser; it's just a matter of understanding the vulnerable patterns to look for.

This course,

Read more

"Hack Yourself First" is all about developers building up cyber-offense skills and proactively seeking out security vulnerabilities in their own websites before an attacker does.

The prevalence of online attacks against websites has accelerated quickly in recent years and the same risks continue to be readily exploited. However, these are very often easily identified directly within the browser; it's just a matter of understanding the vulnerable patterns to look for.

This course,

, comes at security from the view of the attacker in that their entry point is typically the browser. They have a website they want to probe for security risks and this is how they go about it.

This approach is more reflective of the real online threat than reviewing source code is and it empowers developers to begin immediately assessing their applications even when they're running in a live environment without access to the source. After all, that's what online attackers are doing.

In this course we will identify cyber security risks and vulnerabilities by attacking and hacking into your own website. You will learn about:

This course is for anyone who wants to learn how to hack and improve the security of their code. However, the course is mostly geared towards web developers, not security pros or penetration testers.

We will be heavily using Chrome's developer tools. We will also use Fiddler and some SQL.

Because this course is geared mostly towards web developers, you should be familiar with web development practices and the tools and environments commonly used in web development.

Enroll now

What's inside

Syllabus

Introduction
Transport Layer Protection
Cross Site Scripting (XSS)
Cookies
Read more
Internal Implementation Disclosure
Parameter Tampering
SQL Injection
Cross Site Attacks
Account Management

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Meant for those just learning web development to build security understanding by identifying their own website vulnerabilities before attackers do
Focuses on browser-based vulnerabilities and is designed for practicing penetration testing from the perspective of an external attacker
Uses industry standard tools and technologies like Chrome DevTools, Fiddler, and SQL

Save this course

Save Hack Yourself First: How to go on the Cyber-Offense to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Hack Yourself First: How to go on the Cyber-Offense. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Hack Yourself First: How to go on the Cyber-Offense will develop knowledge and skills that may be useful to these careers:
Web Security Tester
Web security testers identify and mitigate vulnerabilities in web applications before attackers can exploit them. This course introduces the fundamentals of web security, including the most common types of attacks and how to defend against them. With this knowledge, you'll be well-equipped to assess the security of your own websites and to protect them from cyber attacks.
Security Engineer
Security engineers design, implement, and maintain security systems to protect organizations from cyber attacks. This course provides a foundation in web security that can help you to succeed in this role. You'll learn about the most common types of web attacks and how to defend against them, which can help you to keep your organization's data and systems safe.
Software Developer
Software developers build and maintain software applications. This course can help you to develop more secure software by teaching you about the most common types of web attacks and how to defend against them. By understanding how attackers think, you can write code that is more resistant to cyber attacks.
Security Analyst
Security analysts investigate and respond to cyber attacks. This course can help you to develop the skills you need to succeed in this role by teaching you about the most common types of web attacks and how to defend against them. You'll also learn about the tools and techniques that security analysts use to investigate and respond to cyber attacks.
Cybersecurity Analyst
Cybersecurity analysts investigate and respond to cyber attacks. This course can help you to develop the skills you need to succeed in this role by teaching you about the most common types of web attacks and how to defend against them. You'll also learn about the tools and techniques that cybersecurity analysts use to investigate and respond to cyber attacks.
Web Developer
Web developers design and build websites. This course can help you to develop more secure websites by teaching you about the most common types of web attacks and how to defend against them. By understanding how attackers think, you can design and build websites that are more resistant to cyber attacks.
Security Consultant
Security consultants help organizations to improve their security posture. This course can help you to develop the skills you need to succeed in this role by teaching you about the most common types of web attacks and how to defend against them. You'll also learn about the tools and techniques that security consultants use to assess and improve security.
Penetration Tester
Penetration testers use their skills to identify and exploit vulnerabilities in computer systems. This course can help you to develop the skills you need to succeed in this role by teaching you about the most common types of web attacks and how to defend against them. You'll also learn about the tools and techniques that penetration testers use to identify and exploit vulnerabilities.
Malware Analyst
Malware analysts investigate and analyze malware to identify its capabilities and vulnerabilities. This course can help you to develop the skills you need to succeed in this role by teaching you about the most common types of web attacks and how to defend against them. You'll also learn about the tools and techniques that malware analysts use to investigate and analyze malware.
Security Architect
Security architects design and implement security solutions for organizations. This course can help you to develop the skills you need to succeed in this role by teaching you about the most common types of web attacks and how to defend against them. You'll also learn about the tools and techniques that security architects use to design and implement security solutions.
Ethical Hacker
Ethical hackers use their skills to help organizations to improve their security posture. This course can help you to develop the skills you need to succeed in this role by teaching you about the most common types of web attacks and how to defend against them. You'll also learn about the tools and techniques that ethical hackers use to assess and improve security.
Computer Forensic Analyst
Computer forensic analysts investigate and analyze computer systems to identify and preserve evidence of cyber attacks. This course can help you to develop the skills you need to succeed in this role by teaching you about the most common types of web attacks and how to defend against them. You'll also learn about the tools and techniques that computer forensic analysts use to investigate and analyze computer systems.
Network Security Engineer
Network security engineers design, implement, and maintain network security systems. This course can help you to develop the skills you need to succeed in this role by teaching you about the most common types of web attacks and how to defend against them. You'll also learn about the tools and techniques that network security engineers use to protect networks from cyber attacks.
Information Security Analyst
Information security analysts protect organizations from cyber attacks. This course can help you to develop the skills you need to succeed in this role by teaching you about the most common types of web attacks and how to defend against them. You'll also learn about the tools and techniques that information security analysts use to protect organizations from cyber attacks.
Risk Analyst
Risk analysts assess and manage risks to an organization's security. This course can help you to develop the skills you need to succeed in this role by teaching you about the most common types of web attacks and how to defend against them. You'll also learn about the tools and techniques that risk analysts use to assess and manage risks.

Reading list

We haven't picked any books for this reading list yet.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser