Coursera
Coursera Logo

University of Colorado Boulder - Hacking and Patching 

  • Offered byCoursera

Hacking and Patching
 at 
Coursera 
Overview

Learn ethical hacking, its fields & the different types of hackers.

Duration

10 hours

Mode of learning

Online

Difficulty level

Intermediate

Credential

Certificate

Hacking and Patching
 at 
Coursera 
Highlights

  • Learn from eminent faculty of University of Colorado
  • Requires effort of 5 hours per week
  • Earn a certificate from University of Colorado
  • Hands On Learning with Assignments & Quizzes
Read more
Details Icon

Hacking and Patching
 at 
Coursera 
Course details

More about this course
  • In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls. You will learn how to hack web apps with SQL injection vulnerabilities and retrieve user profile information and passwords. You will learn how to patch them with input validation and SQL parameter binding. You will learn the hacking methodology, Nessus tool for scanning vulnerabilities, Kali Linux for penetration testing, and Metasploit Framework for gaining access to vulnerable Windows Systems, deploying keylogger, and perform Remote VNC server injection. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. You will learn how to clone a Kali instance with AWS P2 GPU support and perform hashcat password cracking using dictionary attacks and known pattern mask attacks.
Read more

Hacking and Patching
 at 
Coursera 
Curriculum

Week 1: Injection Web App Attacks and Their Defenses

Course Overview

Command Injection

Review Code to Detect Pattern to Defend Command Injection

Apply Security Design Pattern to Defend Command Injection Attack

Week 2: Hack SQL Databases and Patch Web Apps with SQL Injection Vulnerabilities

SQL Injection Attacks

Patching Web App with SQL Injection Vulnerability

Hacking Methodology

Demystify New OS/PL Will Not Have Injection Vulnerabilities

Escalate Privileges via Deploying Trojan

Escalate Privileges by Bringing in Sophisticated Trojan

Week 3: Memory Attacks and Defenses

Security in Memory Systems and Virtual Memory Layout

Variables Allocation in Virtual Memory Layout

Buffer Overflow

Buffer Overflow Defense

Week 4: Penetration Testing

Vulnerability Scanning with Nessus

Vulnerability and WannaCry Ransomware

Penetration Testing with Kali Linux

Metasploit Framework

Keylogging

Remote VNC Server Injection

Other courses offered by Coursera

– / –
3 months
Beginner
– / –
20 hours
Beginner
– / –
2 months
Beginner
– / –
3 months
Beginner
View Other 6715 CoursesRight Arrow Icon

Hacking and Patching
 at 
Coursera 
Students Ratings & Reviews

1/5
Verified Icon1 Rating
M
m v nithiyakrishna
Hacking and Patching
Offered by Coursera
1
Other: The course is a big disappointment. i never expected that coursera could have such pathetic courses. there is no 0 rating, otherwise i would have given that. really bad experience.
Reviewed on 15 Oct 2020Read More
Thumbs Up IconThumbs Down Icon
View 1 ReviewRight Arrow Icon
qna

Hacking and Patching
 at 
Coursera 

Student Forum

chatAnything you would want to ask experts?
Write here...