logo

Chapter 10 - Ethical Hacking & Incident Response II

Chapter 10 - Ethical Hacking & Incident Response II
Course content
Chapter Kick-off
Ethical Hacking & Incident Response II | Kick-off
Network Hacking
Introduction to Network Hacking
Vulnerabilities and Security Misconfigurations
Penetration Testing Framework
The Metasploit Framework - Tool Introduction
How To Work With Metasploit
Metasploit Terminology
Auxiliary and Exploit Modules
How to Use Metasploit’s Interface
Exploits
Payloads
Databases
Meterpreter
Ready, Set, Lab! - Common Metasploit Applications
Network Hacker - Lab Instructions
Web Application Hacking
Introduction to Web Application Hacking
Securing Web Applications
Types of Vulnerabilities
OWASP Top 10
What Is OWASP?
Broken Access Control
Cryptographic Failures
Injection
Insecure Design
Security Misconfiguration
Vulnerable and Outdated Components
Identification and Authentication Failures
Software and Data Integrity Failures
Security Logging and Monitoring Failures
Server-Side Request Forgery (SSRF)
Incident Response
Introduction to Incident Response
Security Incident
Computer Security Incident Response Team (CSIRT)
From Detection to Remediation
Popular Frameworks
History of Incidents
Dyn Cyber Attack
WannaCry Ransomware Attack
Equifax Breach
Uber Hack
NIST Incident Response
The Road to Recovery
Preparation
Detection and Analysis
Containment, Eradication, and Recovery
Post-Incident Activity
Incident Response Plan - Knowledge Check
Introduction to Incident Response Simulation
Preparation - Knowledge Check
Detection and Analysis - Knowledge Check
Containment, Eradication, and Recovery - Knowledge Check
Post-Incident Activity - Knowledge Check
Incident Response Cases
Capture-the-flag
What is Application Security Testing?
Application Security Testing
Burp Suite - Tool Introduction
Exploring Burp Suite - Dashboard
Exploring Burp Suite - Proxy
Discover Your Inner Hacker
The Challenge
Bug Bounty
Chapter Closure
Ethical Hacking & Incident Response II Quiz
10Questions

TechDX