Course archive

The courses below were all published in 2015 or earlier. While we stand by pubishing them then, we’ve grown so much since. We recognize that these workshops don’t exactly meet our standards, as we understand them today. 

All classes are available within our premium membership, and have adjusted CPE awards to reflect their respective contents. If you join, please keep in mind that some of the information inside might be outdated or not relevant. We’ll be adding notes at the beginning of each course to let you know what’s worth checking out in each! 


The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


Why websites are hacked?

Hacking started as a prank in MIT and grew into a different thing. Earlier hacking was a way to showcase your ninja skills. Nowadays, it has grown to an easy and illegal money making method. Hackers use hacked websites, databases for spamming purposes, selling user information like social security numbers, credit card details and other stuff in underground markets and private forums. Moreover, hacking is done to show-off or as a part of cyber war between different countries.

Certificate of completion, 1 CPE credit


Course format


    • The course is self-paced – you can visit the training whenever you want and your content will be there.
    • Once you’re in, you keep access forever, even when you finish the course. 
    • There are no deadlines, except for the ones you set for yourself. 

SYLLABUS


Module 1: WORDPRESS FINGERPRINTING 

    • Methods
    • Tutorials
    • Login Details
    • Vulnerable Plugins
    • Examples

Module 2: CODING FACTS - THEME BACKDOORING AND PLUG-IN VULNERABILITY 

    • Use of Unsecure Hosting
    • Method to Create symlinks
    • Use of Free Themes
    • Tutorials
    • Security Measures

Module 3: LIST OF TOP WORDPRESS MALWARE INFECTIONS 

    • Top WordPress Malware Infections 
    • Tutorials
    • Identifying Badware Behavior 
    • How to Protect Your Website from Malware Infections

Module 4: UNDERSTANDING WP-CONFING.PHP/.HTACCESS/ROBOTS.TXT 

    • WordPress Security With wp-config.php 
    • WordPress Security Via .htaccess
    • Protecting wp-config.php
    • WordPress Security via robots.txt
    •  Secure Your Website from Website Copier Tools
    • Robots.txt Used in another Way for WordPress Security 
    • Malicious File Located via Plug-ins
    • Tutorials

FINAL EXAM


QUESTIONS? 

If you have any questions, please contact our eLearning Manager at [email protected].

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.