Introduction
TalkTalk Hack
SQL Injection 101
Mitigating the Risks of SQL Injections
The Attack on Valve
Cryptographically Safe Cookies and Cross-site Scripting (XSS)
Preventing Session Hijacking and Man in the Middle Attacks
The Ashley Madison Hack
The Human Impact of Data Breaches
Firewalls, Intrusion Detection System (IDS), and Honeypots
Utilizing Honeypots to Prevent Attacks
The Sony Pictures Hack and the Hard Cost of Breaches
The Drupal Vulnerability
Inventorying and Keeping Frameworks Up-to-Date
Using Shodan to Explore Vulnerabilities
Addressing the Vulnerabilities in a Network
The Nissan Attacks
Breaking Down a Distributed Denial of Service (DDoS) Attack
Coordinating a DDoS Attack with Low Orbit Ion Cannon (LOIC)
Exploring Automated Tools for DDoS Attacks and How to Prevent Attacks
Corporate Espionage and Troy's Vulnerability Discover with Nissan
Thinking Defense in Depth and Educating the Masses
Conclusion
Certification
You will get a certificate on completing this course.
University
This course is not affiliated with any university.
Price
This course costs very less.
Edvicer's Rewards
You can get a cashback of ₹ 100 on buying this course.
Limited Time Discount Offers
Save your money with Edvicer. Check out our premium courses with discount offers.
Save your money with Edvicer. Check out our premium courses with discount offers.
Map your Career
Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.
Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.
Certification
You will get a certificate on completing this course.
University
This course is not affiliated with any university.
Price
This course costs very less.
Edvicer's Rewards
You can get a cashback of ₹ 100 on buying this course.
In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. We don't just talk, we take these incidents and explore the mechanics of how the underlying risks are exploited.
Course Overview
Introduction
TalkTalk Hack
SQL Injection 101
Mitigating the Risks of SQL Injections
The Attack on Valve
Cryptographically Safe Cookies and Cross-site Scripting (XSS)
Preventing Session Hijacking and Man in the Middle Attacks
The Ashley Madison Hack
The Human Impact of Data Breaches
Firewalls, Intrusion Detection System (IDS), and Honeypots
Utilizing Honeypots to Prevent Attacks
The Sony Pictures Hack and the Hard Cost of Breaches
The Drupal Vulnerability
Inventorying and Keeping Frameworks Up-to-Date
Using Shodan to Explore Vulnerabilities
Addressing the Vulnerabilities in a Network
The Nissan Attacks
Breaking Down a Distributed Denial of Service (DDoS) Attack
Coordinating a DDoS Attack with Low Orbit Ion Cannon (LOIC)
Exploring Automated Tools for DDoS Attacks and How to Prevent Attacks
Corporate Espionage and Troy's Vulnerability Discover with Nissan
Thinking Defense in Depth and Educating the Masses
Conclusion
Write your review of Play by Play: Ethical Hacking - Deconstructing the Hack
![]() | ![]() | ![]() |
![]() | ![]() | ![]() |
![]() | ![]() | ![]() |