Play by Play: Ethical Hacking - Deconstructing the Hack
Pluralsight
Course Summary
In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. We don't just talk, we take these incidents and explore the mechanics of how the underlying risks are exploited.
-
+
Course Description
Attacks against information systems have become the established norm for online assets these days. Hacktivists, career criminals, and nation states are all actively compromising our systems with unprecedented regularity, but for many technology professionals, the risks to them remain hypothetical; they hear about these incidents on the news but don't get exposure to how the attacks are actually executed. In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. But we don't just talk, we take these incidents and explore the mechanics of how the underlying risks are actually exploited. It's a real world, very practical look at the state of online security as we deconstruct the hacks.
-
+
Course Syllabus
Course Overview- 1m 14s
—Course Overview 1m 14sSQL Injection: TalkTalk- 16m 9s
—Introduction 2m 48s
—TalkTalk Hack 2m 56s
—SQL Injection 101 6m 10s
—Mitigating the Risks of SQL Injections 4m 13sSession Hijacking: Valve- 9m 32sEvading IDS, Firewalls, and Honeypots: Ashley Madison and Sony Pictures- 21m 15sHacking Web Servers: Drupal- 13m 49sDistributed Denial of Services (DDoS): Nissan- 27m 1s