University of Colorado Boulder - Hacking and Patching
- Offered byCoursera
Hacking and Patching at Coursera Overview
Duration | 10 hours |
Mode of learning | Online |
Difficulty level | Intermediate |
Credential | Certificate |
Hacking and Patching at Coursera Highlights
- Learn from eminent faculty of University of Colorado
- Requires effort of 5 hours per week
- Earn a certificate from University of Colorado
- Hands On Learning with Assignments & Quizzes
Hacking and Patching at Coursera Course details
- In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls. You will learn how to hack web apps with SQL injection vulnerabilities and retrieve user profile information and passwords. You will learn how to patch them with input validation and SQL parameter binding. You will learn the hacking methodology, Nessus tool for scanning vulnerabilities, Kali Linux for penetration testing, and Metasploit Framework for gaining access to vulnerable Windows Systems, deploying keylogger, and perform Remote VNC server injection. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. You will learn how to clone a Kali instance with AWS P2 GPU support and perform hashcat password cracking using dictionary attacks and known pattern mask attacks.
Hacking and Patching at Coursera Curriculum
Week 1: Injection Web App Attacks and Their Defenses
Course Overview
Command Injection
Review Code to Detect Pattern to Defend Command Injection
Apply Security Design Pattern to Defend Command Injection Attack
Week 2: Hack SQL Databases and Patch Web Apps with SQL Injection Vulnerabilities
SQL Injection Attacks
Patching Web App with SQL Injection Vulnerability
Hacking Methodology
Demystify New OS/PL Will Not Have Injection Vulnerabilities
Escalate Privileges via Deploying Trojan
Escalate Privileges by Bringing in Sophisticated Trojan
Week 3: Memory Attacks and Defenses
Security in Memory Systems and Virtual Memory Layout
Variables Allocation in Virtual Memory Layout
Buffer Overflow
Buffer Overflow Defense
Week 4: Penetration Testing
Vulnerability Scanning with Nessus
Vulnerability and WannaCry Ransomware
Penetration Testing with Kali Linux
Metasploit Framework
Keylogging
Remote VNC Server Injection
Other courses offered by Coursera
Hacking and Patching at Coursera Students Ratings & Reviews
- 1-21