Take this
course

Software Development / Security & Encryption

Session Hijacking

Learn details about session hijacking, well-known techniques employed by aggressors, the steps involved in session hijacking, various types of session hijacking and tools for hijacking sessions.

Description

Have you heard the words session hijacking? Simply put, it is defined as an intruder taking over a genuine session between two computers and using it for sinister purposes. In the course Session Hijacking, you will learn details about session hijacking, well-known techniques employed by aggressors, the steps involved in session hijacking, various types of session hijacking, tools for hijacking sessions, ways you can protect yourselves from session hijacking, and how pentesting can be used to identify vulnerabilities. Topics Covered Include: *Session Hijacking *Countermeasures Take Advantage of our extra downloadable supplemental materials. **This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Session Hijacking.
Full details

Curriculum

  • Session Hijacking
    Introduction
    5:40
    Contributors to Session Hijacking
    2:33
    Impact of Session Hijacking
    0:54
    Session Hijacking Strategies
    2:24
    Session Hijacking Process
    2:58
    Types of Session Hijacking
    11:48
    Session Hijacking Tools
    0:51
    DEMO: ZAP Tool
    4:53
    DEMO: Burp Suite
    7:39
    DEMO: TamperIE
    7:51
  • Countermeasures
    Protection Against Session Hijacking
    2:45
    IP Security Architecture
    1:53
    Penetration Testing in Session Hijacking
    4:09
  • Conclusion
    Conclusion
    1:38
    Session Hijacking: Supplemental Materials
    Take advantage of all our extra downloadable supplemental materials. This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Session Hijacking Chapters 1 & 2.

Skills

  • Information Systems Security
  • IT Security
  • Information Security
  • Certified Ethical Hacker (CEH)
  • CompTIA Security+
  • IT Certification
  • IT Security Certification

Similar Courses

More Courses by this Instructor