Ethical Hacker: Hacking Techniques
IT Security
| Intermediate
- 14 videos | 1h 3m 44s
- Includes Assessment
Ultimately, ethical hacking is about hacking, so the ethical hacker must have some hands-on hacking skills. Explore fundamental hacking techniques in this 14-video course: SQL injection, cross-site scripting (XSS), malware, using viruses, DoS attacks, steganography, using Metasploit, and Windows hacking. Key concepts covered here include how to use SQL injection and variations; how to execute basic SQL Injection; and learning how to recognize XSS, an attack on the user via the website, as opposed to attacks on the website via the user. Next, learners examine malware threats and learn how to recognize and describe types of malware; learn to implement an innocuous virus in penetration testing; and learn the types of DoS and associated countermeasures. Continue by learning how steganography works, a technique important to ethical hacking because it is a favorite technique to exfiltrate data from malicious insiders; and the basics of Metasploit, a penetration-testing software that finds security issues, verifies vulnerability mitigations, and manages security assessments. Finally, learn to execute basic Metasploit commands; and learn to use common Windows hacking techniques.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe sql injection and variationsExecute basic sql injectionDescribe cross-site scriptingDescribe malware threatsRecognize and describe types of malwareImplement an innocuous virus in penetration testing
-
Recognize types of dos and associated counter measuresDescribe how steganography worksUse common steganography toolsRecall the basics of metasploitExecute basic metasploit commandsUse common windows hacking techniquesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 10s
-
4m 21sAfter completing this video, you will be able to describe SQL injection and its variations. FREE ACCESS
-
4m 21sLearn how to do basic SQL Injection. FREE ACCESS
-
2m 36sAfter completing this video, you will be able to describe cross-site scripting. FREE ACCESS
-
4m 54sUpon completion of this video, you will be able to describe malware threats. FREE ACCESS
-
8m 11sAfter completing this video, you will be able to recognize and describe types of malware. FREE ACCESS
-
4m 49sIn this video, you will learn how to implement a harmless virus in penetration testing. FREE ACCESS
-
5m 55sAfter completing this video, you will be able to recognize types of DoS and associated countermeasures. FREE ACCESS
-
4m 8sUpon completion of this video, you will be able to describe how steganography works. FREE ACCESS
-
5m 55sLearn how to use common steganography tools. FREE ACCESS
-
3m 45sAfter completing this video, you will be able to recall the basics of Metasploit. FREE ACCESS
-
6m 14sDuring this video, you will learn how to execute basic Metasploit commands. FREE ACCESS
-
6m 11sIn this video, learn how to use common Windows hacking techniques. FREE ACCESS
-
1m 13s