menu
menu
Sign up
Log in
About
Week 16 - Ethical Hacking & Incident Response II (Master)
Course content
Network Hacking
Introduction
Section 1
3
lessons
Week 16 - Kickoff
Introduction to Network Hacking
Vulnerabilities and Security Misconfigurations
Metasploit
Section 2
11
lessons
Penetration Testing Framework
The Metasploit Framework - Tool Introduction
How To Work With Metasploit
Metasploit Terminology
Auxiliary and Exploit Modules
How to Use Metasploit’s Interface
Exploits
Payloads
Databases
Meterpreter
Metasploit Preparations - Knowledge Check
The Network Hacker
Section 3
1
lesson
Ready, Set, Lab! - Common Metasploit Applications
Web Application Hacking
Introduction
Section 1
2
lessons
Introduction to Web Application Hacking
Securing Web Applications
OWASP Top 10
Section 2
14
lessons
Types of Vulnerabilities
OWASP Top 10
What Is OWASP?
Broken Access Control
Cryptographic Failures
Injection
Insecure Design
Security Misconfiguration
Vulnerable and Outdated Components
Identification and Authentication Failures
Software and Data Integrity Failures
Security Logging and Monitoring Failures
Server-Side Request Forgery (SSRF)
OWASP Top 10 - Knowledge Check
Cross-Site Scripting (XSS) - Theory
Section 3
15
lessons
Introduction to HTML & JavaScript
HTML & JavaScript
What Is HTML?
HTML Fundamentals
HTML Playground
What Is JavaScript?
JavaScript Operators
JavaScript Advanced
JavaScript - Knowledge Check
Cross-Site Scripting (XSS) Attacks
The Alert Function
Types of XSS Attacks
Payloads and Proof of Concept
Exploitation Techniques
Protection Against XSS
Cross-Site Scripting (XSS) - Practice
Section 4
2
lessons
Ready, Set, Lab! - Types of XSS
Ready, Set, Lab! - XSS with ChatGPT
Module Closure
Module Closure
Section 1
1
lesson
1
exam
Week 16 - Weekly Quiz (Master)
10
Questions
Week 16 - Key Takeaways