University of Colorado System

Hacking and Patching

Edward Chow

Instructor: Edward Chow

53,697 already enrolled

Course

Gain insight into a topic and learn the fundamentals

3.9

(246 reviews)

Intermediate level
No previous experience necessary
15 hours (approximately)
Flexible schedule
Learn at your own pace

Details to know

Shareable Certificate

Add to your LinkedIn profile

Quizzes and assessments

0 quizzes, 4 assessments

English
Subtitles: Arabic, French,

Course

Gain insight into a topic and learn the fundamentals

3.9

(246 reviews)

Intermediate level
No previous experience necessary
15 hours (approximately)
Flexible schedule
Learn at your own pace

Build your subject-matter expertise

This course is part of the Fundamentals of Computer Network Security Specialization
When you enroll in this course, you'll also be enrolled in this Specialization.
  • Learn new concepts from industry experts
  • Gain a foundational understanding of a subject or tool
  • Develop job-relevant skills with hands-on projects
  • Earn a shareable career certificate
Placeholder

There are 4 modules in this course

In this module we will learn how to hack web app with command injection vulnerability with only four characters malicious string. We will learn how to hack web app with database backend with SQL injection vulnerability and potentially show the list of passwords by injecting string to overwrite SQL query. We will learn how to perform code review to spot the key statements/their patterns that expose the programs for such injection attacks and learn how to patch them. We will learn how to apply security design pattern to defend injection attacks and enhance web security.

What's included

4 videos2 readings

In this module we will learn how to hack web app with database backend with SQL injection vulnerability and potentially show the list of passwords by injecting string to overwrite SQL query.We will learn how to perform code review to spot the key statements/their patterns that expose the programs for such injection attacks and learn how to patch them. We will learn the eight-step hacker methodology for exploit systems. For the escalating privilege techniques, we show how to leverage command injection vulnerability to search file systems and deposit/hide Trojans for future exploit.

What's included

6 videos5 readings

In this module, we learn about the typical protection mechanism provided by the modern OS to prevent process from accessing other pages data belong different process. We will also learn buffer overflow attacks and their common defenses.

What's included

4 videos2 readings

In this module we will learn how to perform Vulnerability Scanning with Nessus tool, learn to perform penetration testing using tools included in Kali Linux distribution and to use Metasploit Framework to take control a vulnerable machine, deploy keylogger, run remote shell and remote VNC injection. We will also learn how to clone an AWS P2.xlarge GPU instance from a Ubuntu image with hashcat software to crack passwords.

What's included

6 videos3 readings

Instructor

Instructor ratings
4.5 (25 ratings)
Edward Chow
University of Colorado System
8 Courses107,245 learners

Offered by

Placeholder

Earn a career certificate

Add this credential to your LinkedIn profile, resume, or CV

Share it on social media and in your performance review

Placeholder

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."

Learner reviews

Showing 3 of 246

3.9

246 reviews

  • 5 stars

    59.34%

  • 4 stars

    13.41%

  • 3 stars

    5.69%

  • 2 stars

    4.06%

  • 1 star

    17.47%

NN
4

Reviewed on Jan 16, 2020

JP
4

Reviewed on Aug 5, 2020

AA
5

Reviewed on May 24, 2020

Recommended if you're interested in Computer Science

You are Currently on slide 1
Placeholder

Open new doors with Coursera Plus

Unlimited access to 7,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions