Ethical Hacker: Hacking Techniques
IT Security
| Intermediate
- 14 videos | 1h 3m 44s
- Includes Assessment
Ultimately, ethical hacking is about hacking, so the ethical hacker must have some hands-on hacking skills. Explore fundamental hacking techniques in this 14-video course: SQL injection, cross-site scripting (XSS), malware, using viruses, DoS attacks, steganography, using Metasploit, and Windows hacking. Key concepts covered here include how to use SQL injection and variations; how to execute basic SQL Injection; and learning how to recognize XSS, an attack on the user via the website, as opposed to attacks on the website via the user. Next, learners examine malware threats and learn how to recognize and describe types of malware; learn to implement an innocuous virus in penetration testing; and learn the types of DoS and associated countermeasures. Continue by learning how steganography works, a technique important to ethical hacking because it is a favorite technique to exfiltrate data from malicious insiders; and the basics of Metasploit, a penetration-testing software that finds security issues, verifies vulnerability mitigations, and manages security assessments. Finally, learn to execute basic Metasploit commands; and learn to use common Windows hacking techniques.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedescribe SQL injection and variationsexecute basic SQL Injectiondescribe cross-site scriptingdescribe malware threatsrecognize and describe types of malwareimplement an innocuous virus in penetration testing
-
recognize types of DoS and associated counter measuresdescribe how steganography worksuse common steganography toolsrecall the basics of Metasploitexecute basic Metasploit commandsuse common Windows hacking techniquessummarize the key concepts covered in this course
IN THIS COURSE
-
1m 10s
-
4m 21s
-
4m 21s
-
2m 36s
-
4m 54s
-
8m 11s
-
4m 49s
-
5m 55s
-
4m 8s
-
5m 55s
-
3m 45s
-
6m 14s
-
6m 11s
-
1m 13s