Ethical Hacking: Session Hijacking.
(eVideo)

Book Cover
Average Rating
Published
Carpenteria, CA linkedin.com, 2016.
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

More Details

Format
eVideo
Language
English

Notes

General Note
9/07/201612:00:00AM
Participants/Performers
Presenter: Malcolm Shore
Description
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.
Description
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions—the valid interactions of unsuspecting users—in order to gain unauthorized access to data and systems and attack an organization from the inside. The root failure is weaknesses in common protocols. To prevent these attacks, IT security professionals need to know which protocols are vulnerable and how to test their systems for exposure. This course teaches you what session hijacking is, and how black-hat hackers use it to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them. Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles. Note: This course maps to the Session Hijacking domain of the Certified Ethical Hacking exam. Review the exam objectives at the EC-Council's website.
System Details
Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.

Citations

APA Citation, 7th Edition (style guide)

Shore, M. (2016). Ethical Hacking: Session Hijacking . linkedin.com.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Shore, Malcolm. 2016. Ethical Hacking: Session Hijacking. linkedin.com.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Shore, Malcolm. Ethical Hacking: Session Hijacking linkedin.com, 2016.

MLA Citation, 9th Edition (style guide)

Shore, Malcolm. Ethical Hacking: Session Hijacking linkedin.com, 2016.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
8d515e8f-598e-7182-26c9-95fb7bbafe64-eng
Go To Grouped Work

Grouping Information

Grouped Work ID8d515e8f-598e-7182-26c9-95fb7bbafe64-eng
Full titleethical hacking session hijacking
Authorshore malcolm
Grouping Categorymovie
Last Update2024-05-20 12:55:14PM
Last Indexed2024-05-21 00:07:09AM

Book Cover Information

Image Sourcesideload
First LoadedJan 21, 2022
Last UsedSep 27, 2022

Marc Record

First DetectedAug 03, 2021 02:20:58 PM
Last File Modification TimeMay 20, 2024 01:01:25 PM

MARC Record

LEADER02571ngm a22003133i 4500
001LDC479404
003LDC
00520240520160610.9
006m        c        
007cr cna       a
008240520s2016    cau077        o   vleng d
040 |a linkedin.com|b eng
050 4|a LDC479404
1001 |a Shore, Malcolm|e speaker.
24510|a Ethical Hacking: Session Hijacking.|c with Malcolm Shore
264 1|a Carpenteria, CA|b linkedin.com,|c 2016.
306 |a 01h:17m:03s
337 |a computer|2 rdamedia
338 |a online resource|2 rdacarrier
500 |a 9/07/201612:00:00AM
5111 |a Presenter: Malcolm Shore
520 |a Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.
520 |a One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions—the valid interactions of unsuspecting users—in order to gain unauthorized access to data and systems and attack an organization from the inside. The root failure is weaknesses in common protocols. To prevent these attacks, IT security professionals need to know which protocols are vulnerable and how to test their systems for exposure. This course teaches you what session hijacking is, and how black-hat hackers use it to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them. Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles. Note: This course maps to the Session Hijacking domain of the Certified Ethical Hacking exam. Review the exam objectives at the EC-Council's website.
538 |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection.
655 4|a Instructional films.|2 lcgft
655 4|a Educational films.|2 lcgft
7102 |a linkedin.com (Firm)
85640|u https://www.linkedin.com/learning/ethical-hacking-session-hijacking?u=103732282&auth=true|z View course details on linkedin.com/learning
85642|3 thumbnail|u https://media.licdn.com/dms/image/C4E0DAQHTYIatFDHt5w/learning-public-crop_288_512/0/1568158505201?e=2147483647&v=beta&t=MneAkRax0vnPaVUVpedLYTv1nSdnibM_4lwLEBJ22uU