menu
menu
Sign up
Log in
About
Week 17 - Ethical Hacking & Incident Response III
Course content
Web Application Hacking
Web Application Hacking
Section 1
24
lessons
1
exam
Week 17 - Kickoff
Introduction to SQL Injection
SQL (Structured Query Language)
What Is a Database?
From Filing Cabinets to Digital Databases
Relational Databases
Database Essentials
Database Management Systems
What Is SQL?
SQL Queries
SQL Queries - Knowledge Check
SQL Aggregate Functions
SQL - Knowledge Check
Why Do Attackers Target SQL?
SQL Injection Objectives and Types
Union-Based SQL Injection
Error-Based SQL Injection
Blind SQL Injection
How to Discover SQLi Vulnerabilities?
SQL Map - Tool Introduction
How Does SQLMap Work?
Protecting Against SQLi
SQL Injection - Knowledge Check
Ready, Set, Lab! - Democracy Under Attack
Week 17 - Democracy Under Attack
2
Questions
Incident Response
Incident Response
Section 1
23
lessons
Introduction to Incident Response
Security Incident
Computer Security Incident Response Team (CSIRT)
From Detection to Remediation
Popular Frameworks
History of Incidents
Dyn Cyber Attack
WannaCry Ransomware Attack
Equifax Breach
Uber Hack
NIST Incident Response
The Road to Recovery
Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity
Incident Response Plan - Knowledge Check
Introduction to Incident Response Simulation
Preparation - Knowledge Check
Detection and Analysis - Knowledge Check
Containment, Eradication, and Recovery - Knowledge Check
Post-Incident Activity - Knowledge Check
Incident Response Cases
Module Closure
Module Closure
Section 1
3
lessons
1
exam
Week 17 - Weekly Quiz
10
Questions
Week 17 - Key Takeaways
Level Up Your LinkedIn Profile
Show Us Your LinkedIn Profile