2015
Pluralsight
Gary Eimerman and Troy Hunt
1:02
English
In this Play by Play, Troy Hunt will show how easy it is for a victim to fall prey to an attack. When all is said and done, you should understand how important it is to be prepared for these attacks and know the right steps to mitigate them in the first place.
Course Overview
1m 14s
Course Overview 1m 14s
Session Hijacking via Cross-site Scripting (XSS)
27m 28s
Reflected Cross-site Scripting 9m 11s
How Can Users and Developers Mitigate Reflected XSS Risks? 7m 28s
Persistent Cross-site Scripting 8m 3s
How Can Users and Developers Combat Persistent XSS? 2m 45s
Hacker Hardware
28m 5s
USB Compromise with Rubber Ducky 7m 59s
WiFi Hijacking with the WiFi Pineapple 20m 5s
Conclusion
5m 13s
Staying Secure in an Always-connected World 5m 13s
pluralsight.com/courses/play-by-play-ethical-hacking-troy-hunt
Download File Size:760.6 MB