categories: Technology & Innovation
Level: General
Course Language: Arabic
Understand how websites and internet services work, including the HTTP protocol, request methods, cookies, and sessions.
Learn about common types of web attacks such as spoofing, vulnerability exploitation, malicious file uploads, and SQL injection.
Gain practical skills in identifying and exploiting vulnerabilities using penetration testing tools and techniques in a safe environment.
Analyze WiFi networks, understand encryption methods, and learn how to test the security of wireless connections.
Explore vulnerabilities in mobile applications and platforms, and apply your knowledge through dedicated labs on mobile devices.
Free lessons
Web Infrastructure
SQL Overview
1. Basics of Web Penetration testing and WiFi security
Web Infrastructure
HTTP Protocol
HTTP Methods
Cookies and Sessions
XSS
CSRF
Path Traversal
LFI and RFI
Unrestricted file upload
SQL Overview
SQL Injection
Concatenation
WiFi Overview
WiFi Encryption
Hacking Mobile Platform
Mobile Hacking LAB
This course aims to equip you with the essential knowledge and skills to understand cybersecurity and identify vulnerabilities that could be exploited by attackers—ethically and safely. It begins by explaining the structure of the web and protocols like HTTP, then moves on to fundamental concepts such as request methods, cookies, and sessions, which are key to understanding how browsers and servers communicate. You'll also explore common types of web attacks, including spoofing, path traversal, SQL injection, and techniques like Local and Remote File Inclusion (LFI/RFI). The course then shifts focus to a critical area—WiFi security. You'll learn about different encryption methods and how to test the security of wireless networks. Additionally, it covers the basics of mobile application penetration testing through hands-on labs that simulate real-world scenarios. This course is designed for beginners in a simple and practical way, helping you build a strong foundation in the field of cybersecurity.
There are no requirements for this course. Your interest in the topic and your commitment to learning are all you need to achieve the utmost benefit from this course.
Cyber Security Assurance TechLead
688 Learners
3 Courses