Information Technology
Star icon
Most Popular
Trending Arrow Icon
Trending
Hands on Training icon
Hands On Training
Star icon
Trending Arrow Icon
Hands on Training icon

Ethical Hacking: Session Hijacking

Course Cover
compare button icon

Course Features

icon

Duration

3.68 hours

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Effort

3 hours per week

icon

Teaching Type

Self Paced

icon

Video Content

3.68 hours

Course Description

Pluralsight does not have an accreditation or official partnership with any of these training centers. EC-Council. The fundamental concept of session persistence in information systems is the EC-Council. Session persistence is an essential component of many features on the web, such as shopping carts and the ability to login. TCP protocol, which is lower on the network tier relies on sessions to allow communication between machines like clients and servers. Session hijacking attacks can seriously compromise the integrity and confidentiality of this communication. The ethical hacker must be able to recognize these risks. These flaws are often exposed because systems are often built insecurely. The risks can be easily mitigated by using simple patterns within an application. This course will discuss both the threats and defenses. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Course Overview

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Understanding Session Hijacking

Session Persistence in Web Applications

Hijacking Sessions in Web Applications

Network and Client Level Session Hijacking

Mitigating the Risk of Session Hijacking

Automating Session Hijack Attacks

Course Instructors

Author Image

James D. Murray

Instructor

James D. Murray is an active information security professional and a deprecated software engineer. Mr. Murray started thinking about programming in 1978 when he wrote his first BASIC program on a Com...
Course Cover