Ethical Hacking: Session Hijacking.
(eVideo)
Author
Contributors
Published
Carpenteria, CA linkedin.com, 2016.
Status
Description
Loading Description...
Also in this Series
Checking series information...
More Details
Format
eVideo
Language
English
Notes
General Note
9/07/201612:00:00AM
Participants/Performers
Presenter: Malcolm Shore
Description
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.
Description
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions—the valid interactions of unsuspecting users—in order to gain unauthorized access to data and systems and attack an organization from the inside. The root failure is weaknesses in common protocols. To prevent these attacks, IT security professionals need to know which protocols are vulnerable and how to test their systems for exposure. This course teaches you what session hijacking is, and how black-hat hackers use it to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them. Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles. Note: This course maps to the Session Hijacking domain of the Certified Ethical Hacking exam. Review the exam objectives at the EC-Council's website.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.
Citations
APA Citation, 7th Edition (style guide)
Shore, M. (2016). Ethical Hacking: Session Hijacking . linkedin.com.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Shore, Malcolm. 2016. Ethical Hacking: Session Hijacking. linkedin.com.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Shore, Malcolm. Ethical Hacking: Session Hijacking linkedin.com, 2016.
MLA Citation, 9th Edition (style guide)Shore, Malcolm. Ethical Hacking: Session Hijacking linkedin.com, 2016.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
8d515e8f-598e-7182-26c9-95fb7bbafe64-eng
Grouping Information
Grouped Work ID | 8d515e8f-598e-7182-26c9-95fb7bbafe64-eng |
---|---|
Full title | ethical hacking session hijacking |
Author | shore malcolm |
Grouping Category | movie |
Last Update | 2024-05-20 12:55:14PM |
Last Indexed | 2024-05-21 00:07:09AM |
Book Cover Information
Image Source | sideload |
---|---|
First Loaded | Jan 21, 2022 |
Last Used | Sep 27, 2022 |
Marc Record
First Detected | Aug 03, 2021 02:20:58 PM |
---|---|
Last File Modification Time | May 20, 2024 01:01:25 PM |
MARC Record
LEADER | 02571ngm a22003133i 4500 | ||
---|---|---|---|
001 | LDC479404 | ||
003 | LDC | ||
005 | 20240520160610.9 | ||
006 | m c | ||
007 | cr cna a | ||
008 | 240520s2016 cau077 o vleng d | ||
040 | |a linkedin.com|b eng | ||
050 | 4 | |a LDC479404 | |
100 | 1 | |a Shore, Malcolm|e speaker. | |
245 | 1 | 0 | |a Ethical Hacking: Session Hijacking.|c with Malcolm Shore |
264 | 1 | |a Carpenteria, CA|b linkedin.com,|c 2016. | |
306 | |a 01h:17m:03s | ||
337 | |a computer|2 rdamedia | ||
338 | |a online resource|2 rdacarrier | ||
500 | |a 9/07/201612:00:00AM | ||
511 | 1 | |a Presenter: Malcolm Shore | |
520 | |a Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems. | ||
520 | |a One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions—the valid interactions of unsuspecting users—in order to gain unauthorized access to data and systems and attack an organization from the inside. The root failure is weaknesses in common protocols. To prevent these attacks, IT security professionals need to know which protocols are vulnerable and how to test their systems for exposure. This course teaches you what session hijacking is, and how black-hat hackers use it to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them. Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles. Note: This course maps to the Session Hijacking domain of the Certified Ethical Hacking exam. Review the exam objectives at the EC-Council's website. | ||
538 | |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection. | ||
655 | 4 | |a Instructional films.|2 lcgft | |
655 | 4 | |a Educational films.|2 lcgft | |
710 | 2 | |a linkedin.com (Firm) | |
856 | 4 | 0 | |u https://www.linkedin.com/learning/ethical-hacking-session-hijacking?u=103732282&auth=true|z View course details on linkedin.com/learning |
856 | 4 | 2 | |3 thumbnail|u https://media.licdn.com/dms/image/C4E0DAQHTYIatFDHt5w/learning-public-crop_288_512/0/1568158505201?e=2147483647&v=beta&t=MneAkRax0vnPaVUVpedLYTv1nSdnibM_4lwLEBJ22uU |