00:04
Welcome to Cyber Eri.
00:05
I am Raymond Evans and I will be your hosts for Cyber Aires Web application penetration, testing course and this video We will be discussing
00:14
introductions. So what will be covered? I'll talk about who I am, and I'm not talking about some assumptions about this course and some expectations I have. So who am I? Well, my name is Raymond M. Is I'm a hacker and coffee enthusiasts and tech chunky. I hold certificates and security, plus G, C, H and G. What
00:34
Course Security Plus and G C H is
00:37
incident handling. I'm a certified incident handler.
00:40
Uh, and G walked Is Web application penetration testing? I actively perform Web application penetration testing for a company in ST Louis. And I also actively performed network penetration testing as well.
00:53
I host a podcast. I host a podcast called The Side of Cybersecurity Podcast, and I organized CT efs for the M. C. P. A ST Louis chapter is where some of my assumptions about this course
01:04
well, this is not a basic courses kind of more advance. You have to know how to use a bunch of different tools or be able to learn how to use different tools pretty quickly. You have to at least have a basic knowledge of Lennox and be comfortable using the command line. You have to know things like I have config. L s
01:22
make the cat V I or Nana whichever is your preference
01:26
and things like that. You know how to use command line and be comfortable with it.
01:32
I could use command line constantly, and you should be using it to if your analytics environment. You should also be familiar with the M software. We will be using virtual box, and
01:46
you should be aware of how
01:49
and make changes to the V EMS comfortably.
01:53
You'll also be able to configure your browser's proxy settings in the network settings portion of your browser.
02:00
This will come in handy when we're using tools like burb sweet and zap, because
02:06
those tools used the 127.0 dot one address as a as a proxy. So
02:14
I know how to do that. So it was covered. I talked about who I am, and I talked about some assumptions for this course, happy hacking everyone. And I hope you have a lot of fun with this course. It's gonna be a good time. I'm gonna learn some awesome stuff and you're gonna learn some really fun techniques and get to try some different things out. Get your hands and integrating into dirty. So
02:34
web out pen testing. Rue. Let's do this.