Hacking and Patching

Coursera Courses ↗ · Coursera

Open Course on Coursera

Free to audit · Opens on Coursera

Hacking and Patching

Coursera · Beginner ·🔐 Cybersecurity ·1mo ago
In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls. You will learn how to hack web apps with SQL injection vulnerabilities and retrieve user profile information and passwords. You will learn how to patch them with input validation and SQL parameter binding. You will learn the hacking methodology, Nessus tool for scanning vulnerabilities, Kali Linux for penetration testing, and Metasploit Framework for gaining access to vulnerable Windows Systems, deploying keylogger, and perform Remote VNC server injection. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. You will learn how to clone a Kali instance with AWS P2 GPU support and perform hashcat password cracking using dictionary attacks and known pattern mask attacks.
Watch on Coursera ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

I Run MCP Servers. Here's What the Recent Vulnerabilities Actually Mean for Me
Understand the impact of recent MCP security vulnerabilities on your servers and take action to secure them
Dev.to · MrClaw207
Ignoring the Recommended Software Update Could Be Catastrophic
Ignoring software updates can lead to catastrophic security consequences, making it crucial to prioritize updates for protection
Medium · Cybersecurity
Understanding Penetration Testing and Its Phases
Learn the phases of penetration testing to protect your organization's technology and data from cyber threats
Medium · Cybersecurity
The Restricted Sessions Cybertalents Web Challenge.
Learn to solve the Restricted Sessions Cybertalents Web Challenge and improve your cybersecurity skills
Medium · Cybersecurity
Up next
What Is Flipper One?
David Bombal
Watch →