Cargando…

Session Hijacking and Prevention Techniques /

This course will start off by understanding the bare bones of the Session, how it can be broken to gain access to accounts. As an ethical hacker, it is imperative to understand how to identify the design flaws that are being exploited and to be addressed to secure the system and/or application. With...

Descripción completa

Detalles Bibliográficos
Autor principal: Iyer, Ashwin (Autor, VerfasserIn.)
Autor Corporativo: Safari, an O'Reilly Media Company (Contribuidor, MitwirkendeR.)
Formato: Video
Idioma:Inglés
Publicado: [Erscheinungsort nicht ermittelbar] : EC-Council, 2020
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1268118185
003 OCoLC
005 20231017213018.0
006 m o c
007 cr uuu---uuuuu
007 vz czazuu
008 210914s2020 mau--- o vleng d
040 |a GBVCP  |b ger  |e rda  |c GBVCP  |d OCLCQ 
035 |a (OCoLC)1268118185 
049 |a UAMI 
100 1 |a Iyer, Ashwin,  |e VerfasserIn.  |4 aut 
245 1 0 |a Session Hijacking and Prevention Techniques /  |c Iyer, Ashwin. 
250 |a 1st edition. 
264 1 |a [Erscheinungsort nicht ermittelbar] :  |b EC-Council,  |c 2020 
264 2 |a Boston, MA :  |b Safari 
300 |a 1 online resource (1 video file, circa 2 hr., 11 min.) 
336 |a zweidimensionales bewegtes Bild  |b tdi  |2 rdacontent/ger 
337 |a Computermedien  |b c  |2 rdamedia/ger 
338 |a Online-Ressource  |b cr  |2 rdacarrier/ger 
500 |a Online resource; Title from title screen (viewed December 30, 2020). 
520 |a This course will start off by understanding the bare bones of the Session, how it can be broken to gain access to accounts. As an ethical hacker, it is imperative to understand how to identify the design flaws that are being exploited and to be addressed to secure the system and/or application. With having multiple, users/systems interconnected the attack surface is huge and high-risk impact, it's important to secure the sessions to prevent unauthorized access. Students will receive hands-on training on each attack scenario and how to identify the flaws and address them with preventive mechanisms. They will learn and look at the scenarios in a haxor way and understand the most widely used attack patterns. This course is useful for all Security Professionals, as it gives a POV(Point of View) from both attack and defence standpoint. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a Safari, an O'Reilly Media Company.,  |e MitwirkendeR.  |4 ctb 
856 4 0 |u https://learning.oreilly.com/videos/~/200254ICRV/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP