Ethical Hacking: Session Hijacking.
(Online Course)

Book Cover
Average Rating
Published
Carpenteria, CA linkedin.com, 2016.
Format
Online Course
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Language
English

Notes

General Note
9/07/201612:00:00AM
Participants/Performers
Presenter: Malcolm Shore
Description
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.
Description
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions—the valid interactions of unsuspecting users—in order to gain unauthorized access to data and systems and attack an organization from the inside. The root failure is weaknesses in common protocols. To prevent these attacks, IT security professionals need to know which protocols are vulnerable and how to test their systems for exposure. This course teaches you what session hijacking is, and how black-hat hackers use it to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them. Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles. Note: This course maps to the Session Hijacking domain of the Certified Ethical Hacking exam. Review the exam objectives at the EC-Council's website.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.

Citations

APA Citation, 7th Edition (style guide)

Shore, M. (2016). Ethical Hacking: Session Hijacking . linkedin.com.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Shore, Malcolm. 2016. Ethical Hacking: Session Hijacking. linkedin.com.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Shore, Malcolm. Ethical Hacking: Session Hijacking linkedin.com, 2016.

MLA Citation, 9th Edition (style guide)

Shore, Malcolm. Ethical Hacking: Session Hijacking linkedin.com, 2016.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.