Hacking and Patching (Coursera)

Hacking and Patching (Coursera)

Añade tu reseña
Añadir a Mis FavoritosAñadido a tus favoritosEliminado de tus favoritos 0
Añadir para comparar

Descripción de “Hacking and Patching (Coursera)”

In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls.

You will learn how to hack web apps with SQL injection vulnerabilities and retrieve user profile information and passwords. You will learn how to patch them with input validation and SQL parameter binding. You will learn the hacking methodology, Nessus tool for scanning vulnerabilities, Kali Linux for penetration testing, and Metasploit Framework for gaining access to vulnerable Windows Systems, deploying keylogger, and perform Remote VNC server injection. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. You will learn how to clone a Kali instance with AWS P2 GPU support and perform hashcat password cracking using dictionary attacks and known pattern mask attacks.

Who is this class for: Any one interested in learning how to hack and patch web apps with injection vulnerabilities, crack passwords on AWS P2 system, system security design pattern using hand-on labs, quick introduction to buffer overflow, Nessus scanning tool and Kali Penetration Testing suite. The needs to know how to program in a high level programming language.

Course 3 of 4 in the Fundamentals of Computer Network Security Specialization

Syllabus

WEEK 1

Injection Web App Attacks and Their Defenses

In this module we will learn how to hack web app with command injection vulnerability with only four characters malicious string. We will learn how to hack web app with database backend with SQL injection vulnerability and potentially show the list of passwords by injecting string to overwrite SQL query. We will learn how to perform code review to spot the key statements/their patterns that expose the programs for such injection attacks and learn how to patch them. We will learn how to apply security design pattern to defend injection attacks and enhance web security.

Graded: Project 3a Hacking Web Apps with Command Injections and Patching them

Graded: Exam 3.1. Assessing Injection Web App Attacks and Their Defenses

WEEK 2

Hack SQL Databases and Patch Web Apps with SQL Injection Vulnerabilities

In this module we will learn how to hack web app with database backend with SQL injection vulnerability and potentially show the list of passwords by injecting string to overwrite SQL query.We will learn how to perform code review to spot the key statements/their patterns that expose the programs for such injection attacks and learn how to patch them. We will learn the eight-step hacker methodology for exploit systems. For the escalating privilege techniques, we show how to leverage command injection vulnerability to search file systems and deposit/hide Trojans for future exploit.

Graded: Project 3b. SQL Injection Attacks and Defenses

Graded: Exam 3.2. Assessing SQL Injection and Hacking Methodology

WEEK 3

Memory Attacks and Defenses

In this module, we learn about the typical protection mechanism provided by the modern OS to prevent process from accessing other pages data belong different process. We will also learn buffer overflow attacks and their common defenses.

Graded: Exam 3.3. Assessing Buffer Overflow Attacks and Defenses

WEEK 4

Penetration Testing

In this module we will learn how to perform Vulnerability Scanning with Nessus tool, learn to perform penetration testing using tools included in Kali Linux distribution and to use Metasploit Framework to take control a vulnerable machine, deploy keylogger, run remote shell and remote VNC injection.

Graded: Project 3c. Cracking Linux password with hashcat using AWS P2 GPU.

Graded: Exam 3.4. Assessing the Scanning and Penetration Testing Skills

Especificaciones: Hacking and Patching (Coursera)

Curso ofrecido por
Disponibilidad

✔ Disponible

Plataforma

Universidad

Impartido por

Edward Chow

País

USA

Nivel, duración y fechas
Nivel

Intermedio

Fecha

04/05/2020

Duración

4 semanas

Tiempo necesario

Sin información

Idioma del curso
Idioma vehicular

Inglés

Subtítulos

No informado

Exámenes y Certificados
Certificados

Certificado de Pago

Exámenes/Proyectos

Con Examen/Proyecto Final de pago

User Reviews

0.0 fuera de 5
0
0
0
0
0
Write a review

Aún no hay reseñas.

Se el primero en opinar sobre “Hacking and Patching (Coursera)”

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

Antes de enviar tu opinión, has de aceptar nuestra política de cookies y privacidad

Este sitio web utiliza cookies para un correcto funcionamiento. Si continúas navegando estás dando tu consentimiento para estas cookies y aceptas nuestra política de cookies, clic para más información.

ACEPTAR
Aviso de cookies
Comparar artículos
  • Total (0)
Comparar
0