We may earn an affiliate commission when you visit our partners.
Course image
Edward Chow
Enroll now

What's inside

Syllabus

Injection Web App Attacks and Their Defenses
In this module we will learn how to hack web app with command injection vulnerability with only four characters malicious string. We will learn how to hack web app with database backend with SQL injection vulnerability and potentially show the list of passwords by injecting string to overwrite SQL query. We will learn how to perform code review to spot the key statements/their patterns that expose the programs for such injection attacks and learn how to patch them. We will learn how to apply security design pattern to defend injection attacks and enhance web security.
Read more
Hack SQL Databases and Patch Web Apps with SQL Injection Vulnerabilities
In this module we will learn how to hack web app with database backend with SQL injection vulnerability and potentially show the list of passwords by injecting string to overwrite SQL query.We will learn how to perform code review to spot the key statements/their patterns that expose the programs for such injection attacks and learn how to patch them. We will learn the eight-step hacker methodology for exploit systems. For the escalating privilege techniques, we show how to leverage command injection vulnerability to search file systems and deposit/hide Trojans for future exploit.
Memory Attacks and Defenses
In this module, we learn about the typical protection mechanism provided by the modern OS to prevent process from accessing other pages data belong different process. We will also learn buffer overflow attacks and their common defenses.
Penetration Testing
In this module we will learn how to perform Vulnerability Scanning with Nessus tool, learn to perform penetration testing using tools included in Kali Linux distribution and to use Metasploit Framework to take control a vulnerable machine, deploy keylogger, run remote shell and remote VNC injection. We will also learn how to clone an AWS P2.xlarge GPU instance from a Ubuntu image with hashcat software to crack passwords.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Intends to teach learners how to perform penetration testing, which is an in-demand skill set in the IT industry
Teaches learners how to implement security mechanisms in web applications, enhancing their understanding of web application security
Covers SQL injection vulnerabilities and their remediation, which are critical techniques for web application security
Provides hands-on labs and interactive materials, which enable learners to apply their skills practically and improve their understanding
Involves a strong focus on command injection vulnerabilities, which is a prevalent threat in web application security

Save this course

Save Hacking and Patching to your list so you can find it easily later:
Save

Reviews summary

Hacking and patching course review

Learners largely agree that this is a good course for beginners that covers command injection, SQL injection, and password cracking in practical exercises. Some learners criticize the lengthy grading process, lecture quality, and accessibility issues with AWS.
Practical exercises are useful
"Great course with practical labs in AWS, i liked it so much recommended 100%"
"hands on with the curriculum."
"I have learnt valuable knowledge and hands-on skills such as creating instances in AWS, command injection, SQL injection and password cracking."
Instructor knows all topics and explains clearly
"Teacher knows all topics and explains clear."
"Thank you very much for hosting this program in Coursera. I have learnt valuable knowledge and hands-on skills such as creating instances in AWS, command injection, SQL injection and password cracking."
"special appreciation to coursera for making this possible for me."
Learners criticize lengthy grading
"the method of qualification demora demasiado, acabe el curso hace mas de dos meses y hasta ahorita estoy recibiendo mi certificado"
Learners criticize accessibility to AWS
"You can't access to the activities of the course because the credit of AWS is not avaliable"
"Se asume que el estudiante tiene una tarjeta de credito y otras facilidades para todos los proyectos."
"Accessing the AWS VM was another frustration which came from the instructions."
"I am not impressed with this course I must say, I do not have a credit card and I can not proceed."
Learners criticize lecture quality
"Perhaps you'd consider my rating as unfair, but I am only giving this course two stars, because the instructors accent is very difficult to follow."
"I didn't understand the course because of the instructor."
"speech not clear and studying not good"
"I cannot loose my time with this kind of courses, i expected much more, and found just the same empty literature as in any other book or web page telling the super hacker secrets"

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Hacking and Patching with these activities:
Read 'Web Application Security' by Ivan Ristic
Gain a comprehensive understanding of web application security threats and defensive mechanisms. This book provides valuable insights to enhance your knowledge.
Show steps
  • Read Chapters on Injection Vulnerabilities
  • Review Code Examples and Case Studies
Review Injection Vulnerabilities
Start by reviewing the basics of injection vulnerabilities that web applications are exposed to. This will create a solid foundation for the content to come.
Show steps
  • Identify Common Injection Vulnerabilities
  • Review Examples of Successful Attacks
  • Practice Identifying Vulnerabilities in Code
Practice Injection Attacks
Solve a series of challenging injection attacks to gain hands-on experience and reinforce your understanding of vulnerabilities.
Browse courses on Injection Attacks
Show steps
  • Set Up a Lab Environment
  • Exploit Command Injection Vulnerabilities
  • Exploit SQL Injection Vulnerabilities
  • Analyze and Fix Code to Prevent Injection Attacks
Five other activities
Expand to see all activities and additional details
Show all eight activities
Attend a Workshop on Penetration Testing
Attend a workshop led by an expert in penetration testing. Gain practical experience and learn advanced techniques for identifying and exploiting vulnerabilities.
Browse courses on Penetration Testing
Show steps
  • Research and Identify a Suitable Workshop
  • Participate Actively and Network with Professionals
Develop a Test Plan for Injection Vulnerability Assessment
Craft a comprehensive test plan to assess the security of your web application against injection vulnerabilities. This will demonstrate your proficiency in designing and executing security tests.
Browse courses on Test Plan
Show steps
  • Identify Injection Attack Vectors
  • Design Test Cases and Scenarios
  • Execute the Test Plan
  • Analyze Results and Report Findings
Develop a Web Application with Secure Input Validation
Build a web application from scratch, implementing secure input validation to protect against injection attacks. This project will solidify your understanding of defensive techniques.
Browse courses on Web Application Security
Show steps
  • Design a Secure Architecture
  • Implement Input Validation Using Regular Expressions
  • Test and Deploy the Web Application
Mentor Junior Developers on Web Security Best Practices
Share your knowledge and guide junior developers in implementing secure coding practices, including injection vulnerability prevention, to improve the security posture of their projects
Browse courses on Mentoring
Show steps
  • Identify Opportunities for Mentoring
  • Provide Guidance on Input Validation and SQL Parameterization
  • Review Code and Offer Suggestions for Improvement
Participate in a Capture the Flag (CTF) Competition
Engage in a CTF competition to challenge your skills and gain real-world experience in identifying and exploiting injection vulnerabilities.
Show steps
  • Join a Team or Compete Solo
  • Solve Injection-Related Challenges
  • Collaborate with Teammates and Learn from Others

Career center

Learners who complete Hacking and Patching will develop knowledge and skills that may be useful to these careers:
Web Application Security Analyst
Web Application Security Analyst helps prevent, detect, and respond to web application security threats by identifying and mitigating vulnerabilities in web applications. This course in Hacking and Patching can help build a foundation in web app security by teaching you how to identify and exploit injection vulnerabilities and how to patch them with input validation and SQL parameter binding.
Information Security Analyst
Information Security Analyst detects, analyzes, and responds to security threats to protect an organization's information systems and data. This course in Hacking and Patching can help build a foundation in information security by teaching you how to identify and exploit vulnerabilities in web applications and operating systems, and how to patch them with input validation and security design patterns.
Penetration Tester
A Penetration Tester evaluates the security of computer systems and networks by simulating attacks on them. This course in Hacking and Patching can help build a foundation in penetration testing by teaching you how to identify and exploit vulnerabilities in web applications and operating systems, and how to use penetration testing tools such as Nessus and Metasploit.
Security Engineer
Security Engineers design, implement, and maintain security measures to protect an organization's information systems and data. This course in Hacking and Patching can help build a foundation in security engineering by teaching you how to identify and exploit vulnerabilities in web applications and operating systems, and how to patch them with input validation and security design patterns.
Software Developer
Software Developers design, develop, and maintain software applications. This course in Hacking and Patching may be useful to Software Developers by teaching them how to identify and exploit vulnerabilities in web applications, and how to patch them with input validation and security design patterns.
Database Administrator
Database Administrators maintain and troubleshoot database systems. This course in Hacking and Patching may be useful to Database Administrators by teaching them how to identify and exploit vulnerabilities in database systems, and how to patch them with input validation and SQL parameter binding.
System Administrator
System Administrators maintain and troubleshoot computer systems and networks. This course in Hacking and Patching may be useful to System Administrators by teaching them how to identify and exploit vulnerabilities in operating systems, and how to patch them with security updates and patches.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. This course in Hacking and Patching may be useful to Security Consultants by teaching them how to identify and exploit vulnerabilities in web applications and operating systems, and how to patch them with input validation and security design patterns.
Network Administrator
Network Administrators maintain and troubleshoot computer networks. This course in Hacking and Patching may be useful to Network Administrators by teaching them how to identify and exploit vulnerabilities in networks, and how to patch them with security updates and patches.
Incident Responder
Incident Responders respond to and mitigate security incidents. This course in Hacking and Patching may be useful to Incident Responders by teaching them how to identify and exploit vulnerabilities in web applications and operating systems, and how to use penetration testing tools such as Nessus and Metasploit.
Malware Analyst
Malware Analysts analyze and mitigate malware threats. This course in Hacking and Patching may be useful to Malware Analysts by teaching them how to identify and exploit vulnerabilities in web applications and operating systems, and how to use penetration testing tools such as Nessus and Metasploit.
Forensic Analyst
Forensic Analysts investigate computer crimes. This course in Hacking and Patching may be useful to Forensic Analysts by teaching them how to identify and exploit vulnerabilities in web applications and operating systems, and how to use penetration testing tools such as Nessus and Metasploit.
Risk Analyst
Risk Analysts assess the risks to an organization's information systems and data. This course in Hacking and Patching may be useful to Risk Analysts by teaching them how to identify and exploit vulnerabilities in web applications and operating systems.
Security Auditor
Security Auditors assess the security of computer systems and networks. This course in Hacking and Patching may be useful to Security Auditors by teaching them how to identify and exploit vulnerabilities in web applications and operating systems, and how to use penetration testing tools such as Nessus and Metasploit.
Threat Intelligence Analyst
Threat Intelligence Analysts collect and analyze threat intelligence to identify and mitigate security threats. This course in Hacking and Patching may be useful to Threat Intelligence Analysts by teaching them how to identify and exploit vulnerabilities in web applications and operating systems, and how to use penetration testing tools such as Nessus and Metasploit.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Hacking and Patching.
Comprehensive guide to web application security testing. It covers a wide range of topics, including vulnerability assessment, penetration testing, and exploit development. It is an excellent resource for anyone who wants to learn more about web application security.
Detailed guide to SQL injection attacks and defenses. It covers the different types of SQL injection attacks, how to detect them, and how to protect against them. It is an excellent resource for anyone who wants to learn more about SQL injection.
Comprehensive guide to memory forensics. It covers the different techniques used to analyze memory dumps, how to identify malware and threats, and how to investigate security incidents. It is an excellent resource for anyone who wants to learn more about memory forensics.
Provides a good general background in web application security. It covers common vulnerabilities such as injection attacks and cross-site scripting, and it discusses defense techniques such as input validation and secure coding practices.
Comprehensive guide to Metasploit, a powerful penetration testing framework. It covers the different features of Metasploit, how to use it to exploit vulnerabilities, and how to develop your own exploits. It is an excellent resource for anyone who wants to learn more about Metasploit.
Classic guide to network security. It covers the different types of network security threats, how to identify them, and how to protect against them. It is an excellent resource for anyone who wants to learn more about network security.
Collection of recipes for performing web application security tests. It covers a wide range of topics, including vulnerability assessment, penetration testing, and exploit development. It is an excellent resource for anyone who wants to learn more about web application security testing.
Guide to using open source tools for penetration testing. It covers a wide range of tools, including vulnerability scanners, password crackers, and exploit frameworks. It is an excellent resource for anyone who wants to learn more about open source penetration testing tools.
Practical guide to penetration testing. It covers the different phases of a penetration test, from planning and reconnaissance to exploitation and reporting. It is an excellent resource for anyone who wants to learn more about penetration testing.
Practical guide to the legal side of ethical hacking. It covers the different laws and regulations that govern ethical hacking, how to stay within the law, and how to avoid legal trouble. It is an excellent resource for anyone who wants to learn more about the legal side of ethical hacking.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Hacking and Patching.
Data Security Champion: SQL Injection and Prevention
Most relevant
Securing Java Web Applications
Most relevant
React 17 Security: Best Practices
Most relevant
Secure Software Development: Implementation
Most relevant
Leveraging Google Cloud Armor, Security Scanner and the...
Most relevant
Ethical Hacking: Web Application Hacking
Most relevant
PHP 8 Web Application Security
Most relevant
Attacks and Exploits: Network and Application Attacks for...
Most relevant
Introduction to Prompt Injection Vulnerabilities
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser