- Level Professional
- المدة 15 ساعات hours
- الطبع بواسطة University of Colorado System
-
Offered by
عن
In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls. You will learn how to hack web apps with SQL injection vulnerabilities and retrieve user profile information and passwords. You will learn how to patch them with input validation and SQL parameter binding. You will learn the hacking methodology, Nessus tool for scanning vulnerabilities, Kali Linux for penetration testing, and Metasploit Framework for gaining access to vulnerable Windows Systems, deploying keylogger, and perform Remote VNC server injection. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. You will learn how to clone a Kali instance with AWS P2 GPU support and perform hashcat password cracking using dictionary attacks and known pattern mask attacks.الوحدات
Course Overview
1
Videos
- Course Overview
1
Readings
- Get help and meet other learners. Join your Community!
Command Injection
1
Videos
- Command Injection
1
Readings
- OWASP Command Injection
Review Code to Detect Pattern to Defend Command Injection
1
Videos
- Review Code to Detect Pattern to Defend Command Injection
1
Readings
- Detecting Command Injection
Apply Security Design Pattern to Defend Command Injection Attack
1
Assignment
- Exam 3.1. Assessing Injection Web App Attacks and Their Defenses
1
Peer Review
- Project 3a Hacking Web Apps with Command Injections and Patching them
1
Discussions
- Good Cybersecurity Design Patterns. What are out there?
1
Videos
- Apply Security Design Pattern to Defend Command Injection Attack
SQL Injection Attacks
1
Videos
- SQL Injection Attacks
1
Readings
- SQL Injection
Patching Web App with SQL Injection Vulnerability
1
Peer Review
- Project 3b. SQL Injection Attacks and Defenses
1
Videos
- Patching Web App with SQL Injection Vulnerability
1
Readings
- SQL Injection Prevention Cheat Sheet
Hacking Methodology
1
Videos
- Hacking Methodology
1
Readings
- Red Teaming: The Art of Ethical Hacking
Demystify New OS/PL Will not Have Injection Vulnerabilities
1
Videos
- Demystify New OS/PL Will Not Have Injection Vulnerabilities
Escalate Privileges via Deploying Trojan
1
Videos
- Escalate Privileges via Deploying Trojan
1
Readings
- Understanding Privilege Escalation
Escalate Privileges by Bringing in Sophisticated Trojan
1
Assignment
- Exam 3.2. Assessing SQL Injection and Hacking Methodology
1
Videos
- Escalate Privileges by Bringing in Sophisticated Trojan
1
Readings
- National Vulnerability Database Entry
Security in Memory Systems and Virtual Memory Layout
1
Videos
- Security in Memory Systems and Virtual Memory Layout
1
Readings
- OWASP Memory Leaks
Variables Allocation in Virtual Memory Layout
1
Videos
- Variables Allocation in Virtual Memory Layout
Buffer Overflow
1
Videos
- Buffer Overflow
1
Readings
- OWASP Buffer Overflow Attacks
Buffer Overflow Defense
1
Assignment
- Exam 3.3. Assessing Buffer Overflow Attacks and Defenses
1
Videos
- Buffer Overflow Defense
Vulnerability Scanning with Nessus
1
Videos
- Vulnerability Scanning with Nessus
1
Readings
- Nessus Training
Vulnerability and WannaCry Ransomware
1
Videos
- Vulnerability and WannaCry Ransomware
Penetration Testing with Kali Linux
1
Peer Review
- Project 3c. Cracking Linux password with hashcat using AWS P2 GPU.
1
Videos
- Penetration Testing with Kali Linux
1
Readings
- Kali Linux & Documentation
Metasploit Framework
1
Videos
- Metasploit Framework
1
Readings
- Metasploit Resources
Keylogging
1
Videos
- Keylogging
Remote VNC Server Injection
1
Assignment
- Exam 3.4. Assessing the Scanning and Penetration Testing Skills
1
Videos
- Remote VNC Server Injection
Auto Summary
Explore the "Hacking and Patching" course on Coursera, designed for IT professionals. Led by expert instructors, this course delves into hacking web apps, securing Linux systems, and patching vulnerabilities. With 900 hours of content, learn to use tools like Nessus, Kali Linux, and Metasploit. Available through Starter and Professional subscriptions, this course is perfect for those looking to advance their cybersecurity skills.

Edward Chow