Session Hijacking
Offered By: Cybrary
Course Description
Overview
We will cover basic information about session hijacking in Module 1. Since this is a skill-based course, we will then move into performing hands-on labs in Module 2. You will also learn how to set up and configure your own virtual environment for performing the example lab provided. The course will culminate with an assessment lab that students will need to perform (found in the supplemental resources section). Knowledge of session hijacking can be beneficial to defenders; however, this course is intended for ethical hackers (attackers). This course will be most beneficial for students that are studying for penetration testing related certifications, like the EC-Council Certified Ethical Hacker (CEH), CompTIA Pentest+, GPEN, or OSCP.
Prerequisites
Students should be familiar with common IT and cybersecurity terminology. Students should also have basic computer knowledge and an understanding of basic computer networking. Students will also need access to Cybrary labs to complete the hands-on part of this course.
Course Goals
By the end of this course, students should be able to:
- Explain what session hijacking is
- Perform a session hijacking attack
Syllabus
- Introduction
- Introduction
- Session Hijacking Introduction
- Session Hijacking Lab
- Session Hijacking Lab Part 1
- Session Hijacking Lab Part 2
- Exploiting the Network Vulnerabilities
- Conclusion
- Conclusion
Taught by
Ken Underhill
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX