Ethical Hacker: Hacking Techniques

IT Security    |    Intermediate
  • 14 videos | 1h 3m 44s
  • Includes Assessment
Rating 4.4 of 53 users Rating 4.4 of 53 users (53)
Ultimately, ethical hacking is about hacking, so the ethical hacker must have some hands-on hacking skills. Explore fundamental hacking techniques in this 14-video course: SQL injection, cross-site scripting (XSS), malware, using viruses, DoS attacks, steganography, using Metasploit, and Windows hacking. Key concepts covered here include how to use SQL injection and variations; how to execute basic SQL Injection; and learning how to recognize XSS, an attack on the user via the website, as opposed to attacks on the website via the user. Next, learners examine malware threats and learn how to recognize and describe types of malware; learn to implement an innocuous virus in penetration testing; and learn the types of DoS and associated countermeasures. Continue by learning how steganography works, a technique important to ethical hacking because it is a favorite technique to exfiltrate data from malicious insiders; and the basics of Metasploit, a penetration-testing software that finds security issues, verifies vulnerability mitigations, and manages security assessments. Finally, learn to execute basic Metasploit commands; and learn to use common Windows hacking techniques.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe sql injection and variations
    Execute basic sql injection
    Describe cross-site scripting
    Describe malware threats
    Recognize and describe types of malware
    Implement an innocuous virus in penetration testing
  • Recognize types of dos and associated counter measures
    Describe how steganography works
    Use common steganography tools
    Recall the basics of metasploit
    Execute basic metasploit commands
    Use common windows hacking techniques
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 10s
  • 4m 21s
    After completing this video, you will be able to describe SQL injection and its variations. FREE ACCESS
  • Locked
    3.  Executing SQL Injection
    4m 21s
    Learn how to do basic SQL Injection. FREE ACCESS
  • Locked
    4.  Cross-site Scripting
    2m 36s
    After completing this video, you will be able to describe cross-site scripting. FREE ACCESS
  • Locked
    5.  Malware Basics
    4m 54s
    Upon completion of this video, you will be able to describe malware threats. FREE ACCESS
  • Locked
    6.  Malware Categories
    8m 11s
    After completing this video, you will be able to recognize and describe types of malware. FREE ACCESS
  • Locked
    7.  Using Viruses in Ethical Hacking
    4m 49s
    In this video, you will learn how to implement a harmless virus in penetration testing. FREE ACCESS
  • Locked
    8.  Denial-of-Service Attacks
    5m 55s
    After completing this video, you will be able to recognize types of DoS and associated countermeasures. FREE ACCESS
  • Locked
    9.  Steganography
    4m 8s
    Upon completion of this video, you will be able to describe how steganography works. FREE ACCESS
  • Locked
    10.  Using Steganography Tools
    5m 55s
    Learn how to use common steganography tools. FREE ACCESS
  • Locked
    11.  Metasploit Basics
    3m 45s
    After completing this video, you will be able to recall the basics of Metasploit. FREE ACCESS
  • Locked
    12.  Executing Metasploit Commands
    6m 14s
    During this video, you will learn how to execute basic Metasploit commands. FREE ACCESS
  • Locked
    13.  Windows Hacking
    6m 11s
    In this video, learn how to use common Windows hacking techniques. FREE ACCESS
  • Locked
    14.  Course Summary
    1m 13s

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 25 users Rating 4.6 of 25 users (25)
Rating 4.6 of 538 users Rating 4.6 of 538 users (538)
Rating 4.7 of 21 users Rating 4.7 of 21 users (21)