COURSE AUTHOR –
Daniel Slater
1. Website hacking
2. Penetration testing
3. How to find vulnerabilities
4. How to secure vulnerabilities
5. How to exploit vulnerabilities
6. Computer security fundamentals
7. How to secure and exploit the OWASP Top 10
8. Cyber security
9. Ethical Hacking
10. How to identify bug bounties
11. Black hat hacker/red team techniques
12. SQL injection
13. Cross site scripting (XSS)
14. Web application security