Wireless Deauthentication Attacks

In this project-based course, you will learn the fundamentals of deauthentication attacks, how to build, program, and use your very own deauther devic…

Beginner’s Guide to sqlmap

Learn to use one of the most popular tools to find SQL injection vulnerabilities: sqlmap. In this course, we start out by creating a simple, free, and…

Introduction to OS Command Injections

OS Command Injections are part of the OWASP Top 10 Web Application Security Risks, and as you will see in this course, this threat can result in serio…

Injection Attacks: The Free Guide

In this course, we explore the biggest risk facing web applications: injections. While we will focus primarily on SQL injections, there are other type…