Course Overview

This learning path provides a comprehensive look at the detection and mitigation of CVEs, covering topics like Log4j vulnerabilities, ethical hacking methods, bug bounty hunting, and Oracle WebLogic security. It includes a deep dive into high-profile CVEs such as Follina (CVE-2022-30190) and the Log4j exploit, alongside practical penetration testing and administration of Oracle WebLogic.

What You Will Learn

  • Detect and exploit high-profile CVEs like Log4j and Follina.
  • Perform CVE-based penetration testing and bug bounty hunting.
  • Administer and secure Oracle WebLogic environments.
  • Implement strategies to mitigate vulnerabilities and enhance system security.

Program Curriculum

Content
  • Chapter 1: Introduction
  • Chapter 2: OWASP Top 10
  • Chapter 3: Burp Suite and Lab Setup
  • Chapter 4: Authentication Bypass
  • Chapter 5: No Rate-Limit Attacks
  • Chapter 6: Cross Site Scripting (XSS)
  • Chapter 7: Cross Site Request Forgery (CSRF)
  • Chapter 8: Cross Origin Resource Sharing (CORS)
  • Chapter 9: How to Start with Bug Bounty Platforms and Reporting
  • Chapter 10: Exploitation of CVE 2020-5902 Remote Code Execution
  • Chapter 11: Exploitation of CVE 2020-3452 File
  • Chapter 12: Exploitation of CVE 2020-3187 File Delete

Content
  • Chapter 1: Introduction
  • Chapter 2: WebLogic Domain
  • Chapter 3: WebLogic Servers
  • Chapter 4: JDBC Data Sources
  • Chapter 5: JMS
  • Chapter 6: Application Deployment

Content
  • Chapter 1: Installation
  • Chapter 2: Live Hunting

Content
  • Chapter 1: Overview of Apache Log4J
  • Chapter 2: Insight into the Vulnerability
  • Chapter 3: Risk Response
  • Chapter 4: Scanning and Detection
  • Chapter 5: Understand the Adversaries Perspective
  • Chapter 6: Mitigation of Log4J

Content
  • Chapter 1: Introduction to Follina and Cybersecurity Basics
  • Chapter 2: Deep Dive into Follina Vulnerability
  • Chapter 3: Prevention, Detection, and Mitigation

Content
  • Chapter 1: Security
  • Chapter 2: High Availability and Failover
  • Chapter 3: Node Manager
  • Chapter 4: Distributed Deployment
  • Chapter 5: WebLogic Scripting Tool

Content
  • Chapter 1: Introduction
  • Chapter 2: All About CVE's
  • Chapter 3: BugCrowd VRT
  • Chapter 4: Shodan
  • Chapter 5: Censys
  • Chapter 6: Google Dork
  • Chapter 7: Certificate Transparency
  • Chapter 8: HackerOne Severity
  • Chapter 9: Setting up Environment
  • Chapter 10: Microweber CVE's
  • Chapter 11: Jira CVE's
  • Chapter 12: SAP CVE
  • Chapter 13: IceWarp CVE
  • Chapter 14: BigIP CVE
  • Chapter 15: Cisco CVE's
  • Chapter 16: Visual Recon
  • Chapter 17: How to Start with Bug Bounty Platforms and Reporting
  • Chapter 18: Awesome Resources
  • Chapter 19: Bug Bounty Free VPS
  • Chapter 20: Bug Bounty VPS Alerts & Notifications
  • Chapter 21: Kubernetes CVE
  • Chapter 22: Citrix CVE
  • Chapter 23: Apache CVE
Load more modules

Instructor

Armaan Sidana

Armaan Sidana is a multifaceted individual with a passion for excellence across various domains. His expertise lies in the dynamic field of cybersecurity, where he holds notable certifications such as OSCP, CEH, CISA, and CSFPC. As a committed professional, He consistently seeks opportunities to contribute to the ever-evolving landscape of information security. Secured 100+ Companies with 1500+ Security Bugs. 

Mentored 25000+ students till now, being the guest lecturer at many educational institutions.

RLBC

Founded in 2019, RLBC is a content production consulting company based in Versailles, France. RLBC works with a team of SME professionals in the fields of Fintech, IT, and content marketing. The company produces digital education content for on-trend SME topics. For the NFT data science subject matter the team, better known as the NFT Guys, includes George, an IT industry veteran leading and managing engineering teams in the cybersecurity-critical sector from Brussels, who is well-versed in creating NFTs, and Robert, a veteran Fintech lecturer and maître conferencier in finance & accounting from New York. Robert is the author of Fashion and Art Coins published on pages 115 – 120 of Edmunds, John C., Editor (2020) Rogue Money and the Underground Economy, An Encyclopedia of Alternative and Cryptocurrencies, Greenwood: ABC – CLIO.

RLBC

Founded in 2019, RLBC is a content production consulting company based in Versailles, France. RLBC works with a team of SME professionals in the fields of Fintech, IT, and content marketing. The company produces digital education content for on-trend SME topics. For the NFT data science subject matter the team, better known as the NFT Guys, includes George, an IT industry veteran leading and managing engineering teams in the cybersecurity-critical sector from Brussels, who is well-versed in creating NFTs, and Robert, a veteran Fintech lecturer and maître conferencier in finance & accounting from New York. Robert is the author of Fashion and Art Coins published on pages 115 – 120 of Edmunds, John C., Editor (2020) Rogue Money and the Underground Economy, An Encyclopedia of Alternative and Cryptocurrencies, Greenwood: ABC – CLIO.

Christopher Parent

Christopher has over 15 years of software development, architecture, and IT management experience in defense and commercial industries, focusing on enterprise and cloud architectures. He has consulted as an architect and sales consultant with companies such as Lockheed Martin, Northrop Grumman, Raytheon, and Oracle on the implementation and use of Oracle Fusion Middleware products including Oracle WebLogic Server, SOA Suite, and Identity and Access Management. He received his undergraduate and graduate degrees in Computer Science and Systems Engineering from Rensselaer Polytechnic University in Troy, NY, and Penn State University respectively. Chris resides with his beautiful family in Denver, Colorado USA.

Christopher Parent

Christopher has over 15 years of software development, architecture, and IT management experience in defense and commercial industries, focusing on enterprise and cloud architectures. He has consulted as an architect and sales consultant with companies such as Lockheed Martin, Northrop Grumman, Raytheon, and Oracle on the implementation and use of Oracle Fusion Middleware products including Oracle WebLogic Server, SOA Suite, and Identity and Access Management. He received his undergraduate and graduate degrees in Computer Science and Systems Engineering from Rensselaer Polytechnic University in Troy, NY, and Penn State University respectively. Chris resides with his beautiful family in Denver, Colorado USA.

Ákos Jakab

Ákos Jakab is an ethical hacker, penetration tester and vulnerability researcher with a profound passion for both exploring the depths of cybersecurity and creating impactful educational content. His experience includes crafting over 230 interactive tutorials and CTF-like exercises, showcasing his ability to translate complex cybersecurity concepts into accessible and engaging learning experiences. This experience is complemented by his comprehensive penetration testing across a variety of targets and his detailed analyses of CVEs (Common Vulnerabilities and Exposures). You'll be guided through the dynamic world of cybersecurity, gaining the necessary knowledge and skills to navigate and succeed in this field.

Jason Maynard

Jason has been architecting, designing, and deploying security technologies that secure the most complex computing environments for almost 2 decades. Leveraging multiple technologies as a systems administrator, infrastructure architect, and solutions integrator before focusing primarily on security. Jason has been using virtualization technologies going back to VMware GSX/ESX back in 2001/2002 (outside of networking virtualization such as VLANs and VRFs). Jason’s understanding of technologies, people, and process enable him to deliver effective, comprehensive security solutions that align with an organization’s security goals and strategic imperatives. Jason is adept at addressing a range of risk profiles across multiple industry verticals; skills he has cultivated as an end-user security practitioner, partner/integrator, and now manufacturer as Senior Technical Solutions Architect, focused on Cybersecurity. Jason is also active in the direct community speaking at multiple conferences and getting deep delivering sessions at multiple BSides events. Jason also holds over 75+ designations across a variety of products and technologies including the CCIE designation.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering video-based learning with 840+ courses and diverse Learning Paths to enhance your skills.

$ 69.00
Billed monthly or $599.00 billed annually

What is included

  • 840+ Premium Short Courses
  • 70+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs and CTF Challenges for comprehensive skill-building.

$ 79.00
Billed monthly or $699.00 billed annually

Everything in Pro and

  • 1400+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month

Related Learning Paths

1 of 50

Quick View

CVEs Detection and Mitigation

Skip to product information
1 of 1
What's included
  • Full Video Access
  • Self-Paced Study Guide
  • 6 months of access to virtual labs
  • Once redeemed, this bundle will be valid for 12 months
  • Self-Paced Study Guide
  • Exam Voucher + Retake
View full details

CVEs Detection and Mitigation

CVEs Detection and Mitigation