Course Overview

Programming skills are vital for ethical hackers, as they are required to connect to and analyze systems and programs, discover vulnerabilities, automate time-consuming tasks and write exploits. You'll learn how to code in C, C++ and Java. You'll master JavaScript, Python and its applications. You'll learn Ruby on Rails. You'll also gain a detailed understanding of the Secure Software Lifecycle.

What You Will Learn

  • Develop a C program in a Secured Way
  • Fundamentals of creating secure code in C++
  • Fundamentals of creating secure code in Java
  • Learn how to spot
  • exploit and patch the vulnerabilities in a JavaScript
  • Understanding Web Applications Pentesting Library and Toolkits
  • You will have knowledge of the various security issues and flaws that exist.
  • Fundamental features and philosophy of Linux system
  • Learn to create a virtual lab
  • all the basic commands and navigating the shell
  • Learn the basics of Jq
  • Build your knowledge on secure software assurance.

Program Curriculum

Content
  • Chapter 1: Introduction to Jq Command
  • Chapter 2: Jq Filters and Options
  • Chapter 3: Simple Usage of Jq Commands in Shell Scripts
  • Chapter 4: Working with JSON Arrays
  • Chapter 5: Constructing Objects|Array|null|number|string|Boolean with and without Inputs
  • Cha

Content
  • Chapter 1: Introduction
  • Chapter 2: Injections in Rails
  • Chapter 3: CSRF and Clickjacking in Rails
  • Chapter 4: Default Headers and CSPs
  • Chapter 5: Rate Limiting using Rack Attack
  • Chapter 6: Filters & Testing Applications using Brakeman
  • Chapter 7: Wind Up

Content
  • Chapter 1: Python Setup and Components
  • Chapter 2: Working with Python Network Recon Framework
  • Chapter 3: The Python Spy Web Recon
  • Chapter 4: The Password Cracker Working with Brute-Force Tools
  • Chapter 5: Evade Antivirus with Python
  • Chapter 6: Python Forens

Content
  • Chapter 1: Introduction to C++ Programming
  • Chapter 2: Battling Integer Vulnerabilities in C++
  • Chapter 3: Memory Management in C++
  • Chapter 4: Pointer Subterfuge and Object Misuse in C++
  • Chapter 5: Code Injection Attacks and Run-time Countermeasures
  • Chap

Content

Content

Content

Content

Content

Content

Load more modules

Instructor

Kamil Gierach-Pacanek

He is a 32yo Senior Developer with 11 years of professional experience. In his spare time, he actively promotes Ethical Hacking as a way to develop security awareness. He is bridging the distance between practical applications and theoretical knowledge, by publishing detailed hacking challenges write-ups, participating in CTF events, and presenting step-by-step guides on CyberEthical.Me.

Howard Poston

Howard Poston has over a decade of experience in C, C++, Java programming and a background in cybersecurity. He is a blockchain and cybersecurity trainer, writer, consultant, and researcher and has a Master’s degree in Cyber Operations, and is a Certified Ethical Hacker. Howard also has experience in teaching online courses, having created and delivered half a dozen different courses live, remotely, and on-demand on different cybersecurity topics

Victor Wong

Victor has a PhD in Computer Science, with research area on algorithms for robotic exploration and mapping. He is a Postdoc in developing algorithms and software for robotic systems (using ROS, a Linux (Ubuntu) based OS system for robots). He has 4 years' experience as a Software developer and engineer of ERP system for aviation industry. He has worked for 6 years as a part-time course instructor, teaching CS courses in universities, including Linux and shell scripting. He has also worked for 4 years as a full-time course instructor (to present), teaching CS courses in university, including Linux and shell scripting (both in-person and online). He is popular among students for presenting clear, organized and interactive lectures, and for being patient and humorous. He Likes to keep learning and researching to be always at the front of innovation with an open minded and positive spirt.

Riyaz Rafi Ahmed

Riyaz Rafi Ahmed has intense experience in Information Security, VAPT, AWS - Security, Ruby on Rails - Programming

Dan Shoemaker

Security (building security solutions from scratch), Blue-teaming, and Security Awareness Training. He has completed over 13 professional courses in the domain of security from various universities such as the University System of Georgia and University of California San Diego and has given multiple talks on topics related to digital privacy and security online in various colleges and national organizations attended by students and subject matter experts alike. Having spent close to 2 years in the domain and given multiple talks on various topics, Riyaz understands how developers start out as he himself is one and is the perfect trainer for this course on understanding security with the example of ruby on rails.

Chris Bingham

Dan Shoemaker has been involved in the field of software assurance since its beginnings in 2005. He was part of the original software assurance initiative at the Department of Homeland Security and Chaired its Workforce Training and Education arm for four years, 2008 to 2012. He was a subject matter expert for both the NICE Workforce Framework and the Cybersecurity Curricular Guidelines projects. He has been a consultant and practitioner in the field for close to forty years and a professor for thirty-five. Finally, he is a Distinguished Visitor of the IEEE. and he has written twelve books and close to two-hundred articles in the field.

Narendra P

The author of this course is Chris Bingham. He is the founder of two Cybersecurity organizations: Bsides Triad and InfoSec GSO. He is experienced not only in the technical aspects pertaining to this course but an effective communicator and teacher as well. You will find a very natural progression of this course as your skills improve, from beginner to intermediate. He is a seasoned and experienced user of Linux and he understands the needs of a student and tailors his courses accordingly.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Learning Paths

1 of 8

Quick View

Programming for Ethical Hackers

Skip to product information
1 of 1
What's included
  • Full Video Access
  • Self-Paced Study Guide
  • 6 months of access to virtual labs
  • Once redeemed, this bundle will be valid for 12 months
  • Self-Paced Study Guide
  • Exam Voucher + Retake
View full details

Programming for Ethical Hackers

Programming for Ethical Hackers