• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

IT & Software Session Hijacking | Cybrary (1 Viewer)

Currently reading:
 IT & Software Session Hijacking | Cybrary (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

protectaccount

Member
Amateur
LV
3
Joined
Nov 21, 2025
Threads
732
Likes
61
Awards
8
Credits
15,213©
Cash
0$
amPl1fW.png
Course Description


We will cover basic information about session hijacking in Module 1. Since this is a skill-based course, we will then move into performing hands-on labs in Module 2. You will also learn how to set up and configure your own virtual environment for performing the example lab provided. The course will culminate with an assessment lab that students will need to perform (found in the supplemental resources section). Knowledge of session hijacking can be beneficial to defenders; however, this course is intended for ethical hackers (attackers). This course will be most beneficial for students that are studying for penetration testing related certifications, like the EC-Council Certified Ethical Hacker (CEH), CompTIA Pentest+, GPEN, or OSCP.


Prerequisites


Students should be familiar with common IT and cybersecurity terminology. Students should also have basic computer knowledge and an understanding of basic computer networking. Students will also need access to Cybrary labs to complete the hands-on part of this course.


Course Goals


By the end of this course, students should be able to:

Explain what session hijacking is
Perform a session hijacking attack
Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom