1.1 Course Introduction

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 18 minutes
Difficulty
Intermediate
CEU/CPE
2
Video Transcription
00:01
Hi, everyone. Welcome to the session hijacking course here on Saberi. My name is Ken Underhill on Master Instructor. A Sigh Berry and I'll be partnering up with Dave Crew practice. Who's one of our other instructors for this course. Now, this course is a skill based course, So we're focused primarily on labs, but we will give you a brief overview of what session hijacking is.
00:19
So in this video, we're gonna talk about things like the course objectives. I'll give an introduction to David myself, and the world is going to talk about the core structure itself.
00:27
So in this courses I mentioned, you're gonna learn about what session hijacking is in some of the different attacks we can do for it
00:32
as well as you're gonna learn some competencies with hands on lap. So my lab all focus on I'll be showing you a tool called Enter Cap and will perform a man in the middle attack and try to gain some user credentials by taking over the session. And then Dave will have a nice life for you as well.
00:48
Some prerequisites that you'll need for this particular course to be successful or a foundational knowledge of operating systems. So things like clinics or Windows we're not gonna dive into Mac it all
00:58
also, some basic computer networking. So on. And so when I talk about things like the TCP three way handshake and talk about communication, you know what that is, and you're not completely lost. However, if you are completely lost, if you don't know anything about what that is, you can always pause a video. Just take a look at several of our networking courses on Cyber to get a foundation of knowledge of that,
01:15
and they just restart the videos in this course that move through it.
01:19
Also, you want to understand what applications as far as how a user can communicate with a Web application server and understanding that communication stream. And then this course is always, at least with all my pen testing type courses. It's primarily focused for individuals
01:34
that are gonna be taking, you know, pen tests related exam. So things like the C E, a tour pen test plus or even G pen or even the S E p.
01:42
So who are we? Well, I'm kind of journalism mentioned Master Instructor, a cyber have also aging professor of digital forensics. I hold a masters in cyber security and information insurance, but also hold the EEC counsel, certified ethical hacker and computer hacking forensic investigator certifications. I'm also study for my comp t a pen test plus right now as well.
02:00
So depending on what he watched, this might actually have that certification.
02:04
And I've written questions for the C E. H on also the CH EF Eye exams, and I've also reviewed questions and content for both of those.
02:13
Take a practice. Who's teaming up with me on this course? He's, ah, instructor here at Cyber. He's also holds the MBA, and he's working on his doctorate degrees. Well, he's an entrepreneur. He owns a consulting company out of the New York area. So if you need a consultant, he's definitely a good person to go to. He primarily does, like pen testing or other I T related consulting.
02:31
He's studying for several penetration testing related certifications. So right now he's studying for the CH,
02:37
and then he played some other ones in his pipeline is well,
02:39
he's an avid ethical hacker, very, very good with hands on stuff. So if you have questions on hacking different things. He's a great resource to use. And he loves Red Bull and Coke zero. So if you ever meet him in person and you want to give him a gift, definitely think about giving him Red Bull or Coke. Zero.
02:57
So what are we covered in this course I mentioned in the introduction? Of course. In this video recovering who? We are in a little bit of background about the course and then in the video. Right after this, we'll talk about what session hijacking isn't some examples and then it Marshall to move into our labs and then much of three. We're just gonna wrap things up.
03:14
So this course is structured, as many separate courses are with on demand videos. So let it be, as I mentioned, one lecture video, and then the rest are gonna be lab videos.
03:23
We've got an assessment for you to download. So just some different things that will want you to do and then supplement of resource is will have some step by step guides in some other helpful information there for you to download as well. So be sure to check out the resource is section and download all that information.
03:38
So one quick and easy post assessment question for you,
03:42
David myself, we have master's degrees in art history. Is that true or false?
03:46
All right. Okay. Of course, that one is false, right? You should have gotten that if you were paying attention at all. Um, and as I usually do, I like to keep the introduction questions pretty easy here.
03:54
So as I mentioned in this video, we learned about who Dave and I are. We also talked about this course structure, the course objectives and some of the pre rex you needed. And in the next video, we'll go over actual lecture and session hijacking where we learn about what it is and we take an example. Look at these. How we can hijack a session.
Up Next
Session Hijacking

This course covers session hijacking, which is where an attacker takes over a legitimately established session between a user and host. This is normally seen between a user and a Web server, but it could occur with a Telnet session or other TCP-based connection.

Instructed By