Checklist

Certification

You will get a certificate on completing this course.

University

This course is not affiliated with any university.

Price

This course costs very less.

Edvicer's Rewards

You can get a cashback of ₹ 100 on buying this course.

Play by Play: Ethical Hacking - Deconstructing the Hack

Play by Play: Ethical Hacking - Deconstructing the Hack

1425/month
Start anytime
Self paced
English
Course by
PluralsightCourses from Pluralsight
Certificate awarded
Beginner
Login to earn ₹ 100

Limited Time Discount Offers

Save your money with Edvicer. Check out our premium courses with discount offers.

Discount offers - Edvicer

Limited Time Discount Offers

Save your money with Edvicer. Check out our premium courses with discount offers.

Map your Career

Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.

Career Mapper - Edvicer

Map your Career

Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.

Checklist

Certification

You will get a certificate on completing this course.

University

This course is not affiliated with any university.

Price

This course costs very less.

Edvicer's Rewards

You can get a cashback of ₹ 100 on buying this course.

Why should you choose this course?

Description

In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. We don't just talk, we take these incidents and explore the mechanics of how the underlying risks are exploited.

Syllabus

Course Overview
Introduction
TalkTalk Hack
SQL Injection 101
Mitigating the Risks of SQL Injections
The Attack on Valve
Cryptographically Safe Cookies and Cross-site Scripting (XSS)
Preventing Session Hijacking and Man in the Middle Attacks
The Ashley Madison Hack
The Human Impact of Data Breaches
Firewalls, Intrusion Detection System (IDS), and Honeypots
Utilizing Honeypots to Prevent Attacks
The Sony Pictures Hack and the Hard Cost of Breaches
The Drupal Vulnerability
Inventorying and Keeping Frameworks Up-to-Date
Using Shodan to Explore Vulnerabilities
Addressing the Vulnerabilities in a Network
The Nissan Attacks
Breaking Down a Distributed Denial of Service (DDoS) Attack
Coordinating a DDoS Attack with Low Orbit Ion Cannon (LOIC)
Exploring Automated Tools for DDoS Attacks and How to Prevent Attacks
Corporate Espionage and Troy's Vulnerability Discover with Nissan
Thinking Defense in Depth and Educating the Masses
Conclusion

What others say about this course

Write your review of Play by Play: Ethical Hacking - Deconstructing the Hack

Facebook account of EdvicerLinkedin account of EdvicerInstagram account of Edvicer
Twitter account of EdvicerPinterest account of EdvicerYoutube account of Edvicer