European Union

Classes for students who have completed the first semester of the Hacking and Web Creation course.

The second semester is focused on learning about advanced hacking techniques that can be found on the Internet. We will learn how to protect our websites and applications against random threats and cybercrime activities.

  • 14 meetings (once a week)

  • 2 x 45 min (every meeting)

  • Maximum number of students (12)


for the course $0.00


Do you have any questions?

Intro

In this course, the student learns the secrets of hacking (keyloggers, attacks, password capture) in order to know how to protect themselves from it. Students also learn techniques for building modern websites and creating interactive elements (HTML, CSS, JavaScript). Additionally, CMS content management systems are shown here. Students create and publish their own website.

Plan of the course

Repetition of the first semester material.
The aim of the classes will be to create a professional website using the Joomla content management system!
Continuation of previous classes. Showing and explaining how to protect the site from hacker attacks.
The aim of the classes will be to show how to set up hosting, domain and DNS, in order to publish the website on the Internet.
The aim of the lesson will be to discuss what so-called cookies are and to show how to steal them.
During the classes we will discuss the installation of DVWA and Command Injection.
During the class we will discuss the so-called XSS.
During the class we will discuss the so-called SQL Injection.
During the class we will discuss CSRF and File Uploader.
The aim of the lesson will be to show how to protect the passwords we create. In addition, we will show how dictionary attacks are carried out using rainbow tables.
The aim of the lesson will be to explain what DNS Spoofing is and to show how to defend yourself from it.
The aim of the lesson is to learn the method of DNS Spoofing hacking attack
During the lesson we will discuss the technical aspects of hiding applications in other applications, how it works in general and how such software is written. During the lesson we will write an application that will be hidden e.g. in a popular PDF reader.
The purpose of this lesson is to discuss the purpose of code obfuscation and how to implement it