logo

Week 16 - Ethical Hacking & Incident Response II

Week 16 - Ethical Hacking & Incident Response II
Course content
Network Hacking
Week 16 - Kickoff
Introduction to Network Hacking
Vulnerabilities and Security Misconfigurations
Penetration Testing Framework
The Metasploit Framework - Tool Introduction
How To Work With Metasploit
Metasploit Terminology
Auxiliary and Exploit Modules
How to Use Metasploit’s Interface
Exploits
Payloads
Databases
Meterpreter
Metasploit Preparations - Knowledge Check
Ready, Set, Lab! - Common Metasploit Applications
Week 16 - Common Metasploit Applications
2Questions
Web Application Hacking
Introduction to Web Application Hacking
Securing Web Applications
Types of Vulnerabilities
OWASP Top 10
What Is OWASP?
Broken Access Control
Cryptographic Failures
Injection
Insecure Design
Security Misconfiguration
Vulnerable and Outdated Components
Identification and Authentication Failures
Software and Data Integrity Failures
Security Logging and Monitoring Failures
Server-Side Request Forgery (SSRF)
OWASP Top 10 - Knowledge Check
Introduction to HTML & JavaScript
HTML & JavaScript
What Is HTML?
HTML Fundamentals
HTML Playground
What Is JavaScript?
JavaScript Operators
JavaScript Advanced
JavaScript - Knowledge Check
Cross-Site Scripting (XSS) Attacks
The Alert Function
Types of XSS Attacks
Payloads and Proof of Concept
Exploitation Techniques
Protection Against XSS
Ready, Set, Lab! - Types of XSS
Week 16 - Types of XSS
2Questions
Ready, Set, Lab! - XSS with ChatGPT
Week 16 - XSS with ChatGPT
2Questions
Module Closure
Week 16 - Weekly Quiz
10Questions
Week 16 - Key Takeaways

ThriveDX