Hacking and Patching

  • 3.9
Approx. 15 hours to complete

Course Summary

Learn the art of hacking and patching in this comprehensive course. You'll gain an understanding of security vulnerabilities and how to exploit them, as well as how to protect against attacks.

Key Learning Points

  • Understand common security vulnerabilities and how to exploit them
  • Learn how to patch vulnerabilities to protect against attacks
  • Gain hands-on experience with tools and techniques used by real-world hackers

Related Topics for further study


Learning Outcomes

  • Identify common security vulnerabilities and understand how they can be exploited
  • Use tools and techniques to conduct penetration testing and vulnerability assessments
  • Patch vulnerabilities to protect against attacks

Prerequisites or good to have knowledge before taking this course

  • Basic knowledge of computer networks and operating systems
  • Familiarity with programming languages such as Python and Java

Course Difficulty Level

Intermediate

Course Format

  • Online self-paced
  • Video lectures
  • Hands-on projects

Similar Courses

  • Cybersecurity Essentials
  • Penetration Testing and Ethical Hacking
  • Offensive Security Certified Professional

Related Education Paths


Notable People in This Field

  • Kevin Mitnick
  • Bruce Schneier

Related Books

Description

In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls. You will learn how to hack web apps with SQL injection vulnerabilities and retrieve user profile information and passwords. You will learn how to patch them with input validation and SQL parameter binding. You will learn the hacking methodology, Nessus tool for scanning vulnerabilities, Kali Linux for penetration testing, and Metasploit Framework for gaining access to vulnerable Windows Systems, deploying keylogger, and perform Remote VNC server injection. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. You will learn how to clone a Kali instance with AWS P2 GPU support and perform hashcat password cracking using dictionary attacks and known pattern mask attacks.

Outline

  • Injection Web App Attacks and Their Defenses
  • Course Overview
  • Command Injection
  • Review Code to Detect Pattern to Defend Command Injection
  • Apply Security Design Pattern to Defend Command Injection Attack
  • OWASP Command Injection
  • Detecting Command Injection
  • Exam 3.1. Assessing Injection Web App Attacks and Their Defenses
  • Hack SQL Databases and Patch Web Apps with SQL Injection Vulnerabilities
  • SQL Injection Attacks
  • Patching Web App with SQL Injection Vulnerability
  • Hacking Methodology
  • Demystify New OS/PL Will Not Have Injection Vulnerabilities
  • Escalate Privileges via Deploying Trojan
  • Escalate Privileges by Bringing in Sophisticated Trojan
  • SQL Injection
  • SQL Injection Prevention Cheat Sheet
  • Red Teaming: The Art of Ethical Hacking
  • Understanding Privilege Escalation
  • National Vulnerability Database Entry
  • Exam 3.2. Assessing SQL Injection and Hacking Methodology
  • Memory Attacks and Defenses
  • Security in Memory Systems and Virtual Memory Layout
  • Variables Allocation in Virtual Memory Layout
  • Buffer Overflow
  • Buffer Overflow Defense
  • OWASP Memory Leaks
  • OWASP Buffer Overflow Attacks
  • Exam 3.3. Assessing Buffer Overflow Attacks and Defenses
  • Penetration Testing
  • Vulnerability Scanning with Nessus
  • Vulnerability and WannaCry Ransomware
  • Penetration Testing with Kali Linux
  • Metasploit Framework
  • Keylogging
  • Remote VNC Server Injection
  • Nessus Training
  • Kali Linux & Documentation
  • Metasploit Resources
  • Exam 3.4. Assessing the Scanning and Penetration Testing Skills

Summary of User Reviews

Discover the world of ethical hacking with Hacking and Patching course on Coursera. This course has received great reviews from its users, who praise its engaging content and practical exercises. Overall, this course is highly recommended for anyone interested in cybersecurity and hacking.

Key Aspect Users Liked About This Course

Many users found the practical exercises to be a great way to learn and apply the concepts taught in the course.

Pros from User Reviews

  • Engaging content that keeps users interested
  • Practical exercises that help users apply the concepts learned
  • Great introduction to ethical hacking and cybersecurity
  • Well-structured course that is easy to follow
  • Instructor is knowledgeable and provides useful insights

Cons from User Reviews

  • Some users found the course to be too basic
  • Lack of advanced topics for experienced hackers
  • Not enough hands-on experience for some users
  • Some users found the course to be too theoretical
  • Course may not be suitable for beginners with no background in cybersecurity
English
Available now
Approx. 15 hours to complete
Edward Chow
University of Colorado System
Coursera

Instructor

Edward Chow

  • 3.9 Raiting
Share
Saved Course list
Cancel
Get Course Update
Computer Courses