Play by Play: Ethical Hacking - Deconstructing the Hack
In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. We don't just talk, we take these incidents and explore the mechanics of how the underlying risks are exploited.
What you'll learn
Attacks against information systems have become the established norm for online assets these days. Hacktivists, career criminals, and nation states are all actively compromising our systems with unprecedented regularity, but for many technology professionals, the risks to them remain hypothetical; they hear about these incidents on the news but don't get exposure to how the attacks are actually executed. In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. But we don't just talk, we take these incidents and explore the mechanics of how the underlying risks are actually exploited. It's a real world, very practical look at the state of online security as we deconstruct the hacks.
Table of contents
- The Nissan Attacks 2m
- Breaking Down a Distributed Denial of Service (DDoS) Attack 5m
- Coordinating a DDoS Attack with Low Orbit Ion Cannon (LOIC) 3m
- Exploring Automated Tools for DDoS Attacks and How to Prevent Attacks 7m
- Corporate Espionage and Troy's Vulnerability Discover with Nissan 3m
- Thinking Defense in Depth and Educating the Masses 6m
- Conclusion 1m