Course Summary
Learn the art of hacking and patching in this comprehensive course. You'll gain an understanding of security vulnerabilities and how to exploit them, as well as how to protect against attacks.Key Learning Points
- Understand common security vulnerabilities and how to exploit them
- Learn how to patch vulnerabilities to protect against attacks
- Gain hands-on experience with tools and techniques used by real-world hackers
Related Topics for further study
Learning Outcomes
- Identify common security vulnerabilities and understand how they can be exploited
- Use tools and techniques to conduct penetration testing and vulnerability assessments
- Patch vulnerabilities to protect against attacks
Prerequisites or good to have knowledge before taking this course
- Basic knowledge of computer networks and operating systems
- Familiarity with programming languages such as Python and Java
Course Difficulty Level
IntermediateCourse Format
- Online self-paced
- Video lectures
- Hands-on projects
Similar Courses
- Cybersecurity Essentials
- Penetration Testing and Ethical Hacking
- Offensive Security Certified Professional
Related Education Paths
Notable People in This Field
- Kevin Mitnick
- Bruce Schneier
Related Books
Description
In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls. You will learn how to hack web apps with SQL injection vulnerabilities and retrieve user profile information and passwords. You will learn how to patch them with input validation and SQL parameter binding. You will learn the hacking methodology, Nessus tool for scanning vulnerabilities, Kali Linux for penetration testing, and Metasploit Framework for gaining access to vulnerable Windows Systems, deploying keylogger, and perform Remote VNC server injection. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. You will learn how to clone a Kali instance with AWS P2 GPU support and perform hashcat password cracking using dictionary attacks and known pattern mask attacks.
Outline
- Injection Web App Attacks and Their Defenses
- Course Overview
- Command Injection
- Review Code to Detect Pattern to Defend Command Injection
- Apply Security Design Pattern to Defend Command Injection Attack
- OWASP Command Injection
- Detecting Command Injection
- Exam 3.1. Assessing Injection Web App Attacks and Their Defenses
- Hack SQL Databases and Patch Web Apps with SQL Injection Vulnerabilities
- SQL Injection Attacks
- Patching Web App with SQL Injection Vulnerability
- Hacking Methodology
- Demystify New OS/PL Will Not Have Injection Vulnerabilities
- Escalate Privileges via Deploying Trojan
- Escalate Privileges by Bringing in Sophisticated Trojan
- SQL Injection
- SQL Injection Prevention Cheat Sheet
- Red Teaming: The Art of Ethical Hacking
- Understanding Privilege Escalation
- National Vulnerability Database Entry
- Exam 3.2. Assessing SQL Injection and Hacking Methodology
- Memory Attacks and Defenses
- Security in Memory Systems and Virtual Memory Layout
- Variables Allocation in Virtual Memory Layout
- Buffer Overflow
- Buffer Overflow Defense
- OWASP Memory Leaks
- OWASP Buffer Overflow Attacks
- Exam 3.3. Assessing Buffer Overflow Attacks and Defenses
- Penetration Testing
- Vulnerability Scanning with Nessus
- Vulnerability and WannaCry Ransomware
- Penetration Testing with Kali Linux
- Metasploit Framework
- Keylogging
- Remote VNC Server Injection
- Nessus Training
- Kali Linux & Documentation
- Metasploit Resources
- Exam 3.4. Assessing the Scanning and Penetration Testing Skills
Summary of User Reviews
Discover the world of ethical hacking with Hacking and Patching course on Coursera. This course has received great reviews from its users, who praise its engaging content and practical exercises. Overall, this course is highly recommended for anyone interested in cybersecurity and hacking.Key Aspect Users Liked About This Course
Many users found the practical exercises to be a great way to learn and apply the concepts taught in the course.Pros from User Reviews
- Engaging content that keeps users interested
- Practical exercises that help users apply the concepts learned
- Great introduction to ethical hacking and cybersecurity
- Well-structured course that is easy to follow
- Instructor is knowledgeable and provides useful insights
Cons from User Reviews
- Some users found the course to be too basic
- Lack of advanced topics for experienced hackers
- Not enough hands-on experience for some users
- Some users found the course to be too theoretical
- Course may not be suitable for beginners with no background in cybersecurity