Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Session Hijacking and Prevention Techniques

Course Cover
compare button icon

Course Features

icon

Duration

2.11 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

2.11 hours

Course Description

This course will begin by explaining the basics of the Session and how it can be broken to gain account access. It is essential to understand how to spot design flaws and fix them in order to secure the system or application.

Multiple users/systems are interconnected, which means that the attack surface can be large and high-risk. It's important to protect the sessions to prevent unauthorized entry.

Students will be able to practice each attack scenario in a hands-on setting. They will also learn how to spot flaws and implement preventive measures. They will be able to look at the scenarios in a holistic way and learn the most common attack patterns.

This course is beneficial for all Security Professionals as it provides a Point of View (POV) from both an attack and defense perspective.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Learn about the topic CEH (Certified Ethical Hacker)

Course Cover