When you enroll in this course, you'll also be enrolled in this Specialization.
Learn new concepts from industry experts
Gain a foundational understanding of a subject or tool
Develop job-relevant skills with hands-on projects
Earn a shareable career certificate
There are 4 modules in this course
In this MOOC, you will learn how to hack web apps with command injection vulnerabilities in a web site of your AWS Linux instance. You will learn how to search valuable information on a typical Linux systems with LAMP services, and deposit and hide Trojans for future exploitation. You will learn how to patch these web apps with input validation using regular expression. You will learn a security design pattern to avoid introducing injection vulnerabilities by input validation and replacing generic system calls with specific function calls. You will learn how to hack web apps with SQL injection vulnerabilities and retrieve user profile information and passwords. You will learn how to patch them with input validation and SQL parameter binding. You will learn the hacking methodology, Nessus tool for scanning vulnerabilities, Kali Linux for penetration testing, and Metasploit Framework for gaining access to vulnerable Windows Systems, deploying keylogger, and perform Remote VNC server injection. You will learn security in memory systems and virtual memory layout, and understand buffer overflow attacks and their defenses. You will learn how to clone a Kali instance with AWS P2 GPU support and perform hashcat password cracking using dictionary attacks and known pattern mask attacks.
In this module we will learn how to hack web app with command injection vulnerability with only four characters malicious string. We will learn how to hack web app with database backend with SQL injection vulnerability and potentially show the list of passwords by injecting string to overwrite SQL query. We will learn how to perform code review to spot the key statements/their patterns that expose the programs for such injection attacks and learn how to patch them. We will learn how to apply security design pattern to defend injection attacks and enhance web security.
Review Code to Detect Pattern to Defend Command Injection•12 minutes
Apply Security Design Pattern to Defend Command Injection Attack•7 minutes
3 readings•Total 65 minutes
Get help and meet other learners. Join your Community!•5 minutes
OWASP Command Injection•30 minutes
Detecting Command Injection•30 minutes
1 assignment•Total 30 minutes
Exam 3.1. Assessing Injection Web App Attacks and Their Defenses•30 minutes
1 peer review•Total 60 minutes
Project 3a Hacking Web Apps with Command Injections and Patching them•60 minutes
1 discussion prompt•Total 15 minutes
Good Cybersecurity Design Patterns. What are out there?•15 minutes
Hack SQL Databases and Patch Web Apps with SQL Injection Vulnerabilities
Module 2•5 hours to complete
Module details
In this module we will learn how to hack web app with database backend with SQL injection vulnerability and potentially show the list of passwords by injecting string to overwrite SQL query.We will learn how to perform code review to spot the key statements/their patterns that expose the programs for such injection attacks and learn how to patch them. We will learn the eight-step hacker methodology for exploit systems. For the escalating privilege techniques, we show how to leverage command injection vulnerability to search file systems and deposit/hide Trojans for future exploit.
What's included
6 videos5 readings1 assignment1 peer review
Show info about module content
6 videos•Total 54 minutes
SQL Injection Attacks•11 minutes
Patching Web App with SQL Injection Vulnerability•5 minutes
Hacking Methodology•10 minutes
Demystify New OS/PL Will Not Have Injection Vulnerabilities•8 minutes
Escalate Privileges via Deploying Trojan•11 minutes
Escalate Privileges by Bringing in Sophisticated Trojan•9 minutes
5 readings•Total 150 minutes
SQL Injection•30 minutes
SQL Injection Prevention Cheat Sheet•30 minutes
Red Teaming: The Art of Ethical Hacking•30 minutes
Understanding Privilege Escalation•30 minutes
National Vulnerability Database Entry•30 minutes
1 assignment•Total 30 minutes
Exam 3.2. Assessing SQL Injection and Hacking Methodology•30 minutes
1 peer review•Total 60 minutes
Project 3b. SQL Injection Attacks and Defenses•60 minutes
Memory Attacks and Defenses
Module 3•2 hours to complete
Module details
In this module, we learn about the typical protection mechanism provided by the modern OS to prevent process from accessing other pages data belong different process. We will also learn buffer overflow attacks and their common defenses.
What's included
4 videos2 readings1 assignment
Show info about module content
4 videos•Total 51 minutes
Security in Memory Systems and Virtual Memory Layout•15 minutes
Variables Allocation in Virtual Memory Layout•6 minutes
Buffer Overflow•14 minutes
Buffer Overflow Defense•16 minutes
2 readings•Total 60 minutes
OWASP Memory Leaks•30 minutes
OWASP Buffer Overflow Attacks•30 minutes
1 assignment•Total 30 minutes
Exam 3.3. Assessing Buffer Overflow Attacks and Defenses•30 minutes
Penetration Testing
Module 4•5 hours to complete
Module details
In this module we will learn how to perform Vulnerability Scanning with Nessus tool, learn to perform penetration testing using tools included in Kali Linux distribution and to use Metasploit Framework to take control a vulnerable machine, deploy keylogger, run remote shell and remote VNC injection. We will also learn how to clone an AWS P2.xlarge GPU instance from a Ubuntu image with hashcat software to crack passwords.
What's included
6 videos3 readings1 assignment1 peer review
Show info about module content
6 videos•Total 37 minutes
Vulnerability Scanning with Nessus•7 minutes
Vulnerability and WannaCry Ransomware•8 minutes
Penetration Testing with Kali Linux•7 minutes
Metasploit Framework•11 minutes
Keylogging•3 minutes
Remote VNC Server Injection•2 minutes
3 readings•Total 90 minutes
Nessus Training•30 minutes
Kali Linux & Documentation•30 minutes
Metasploit Resources•30 minutes
1 assignment•Total 30 minutes
Exam 3.4. Assessing the Scanning and Penetration Testing Skills•30 minutes
1 peer review•Total 120 minutes
Project 3c. Cracking Linux password with hashcat using AWS ubuntu t2.micro instance.•120 minutes
Earn a career certificate
Add this credential to your LinkedIn profile, resume, or CV. Share it on social media and in your performance review.
Instructor
Instructor ratings
Instructor ratings
We asked all learners to give feedback on our instructors based on the quality of their teaching style.
The University of Colorado is a recognized leader in higher education on the national and global stage. We collaborate to meet the diverse needs of our students and communities. We promote innovation, encourage discovery and support the extension of knowledge in ways unique to the state of Colorado and beyond.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.