RiseUpp Logo
Educator Logo

Hacking and Patching

Master ethical hacking methodologies and security patch implementations for comprehensive web application and system security enhancement.

Master ethical hacking methodologies and security patch implementations for comprehensive web application and system security enhancement.

This course cannot be purchased separately - to access the complete learning experience, graded assignments, and earn certificates, you'll need to enroll in the full Fundamentals of Computer Network Security Specialization program. You can audit this specific course for free to explore the content, which includes access to course materials and lectures. This allows you to learn at your own pace without any financial commitment.

4

(269 ratings)

60,994 already enrolled

Instructors:

English

پښتو, বাংলা, اردو, 3 more

Powered by

Provider Logo
Hacking and Patching

This course includes

15 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

What you'll learn

  • Exploit and patch command injection vulnerabilities

  • Perform SQL injection attacks and implement defenses

  • Understand buffer overflow attacks and memory security

  • Use professional tools for penetration testing

  • Implement security patches for web applications

  • Conduct vulnerability assessments using industry tools

Skills you'll gain

Ethical Hacking
Penetration Testing
SQL Injection
Command Injection
Buffer Overflow
Security Patching
Kali Linux
Metasploit
Vulnerability Assessment
Network Security

This course includes:

2.88 Hours PreRecorded video

4 assignments

Access on Mobile, Tablet, Desktop

FullTime access

Shareable certificate

Closed caption

Get a Completion Certificate

Share your certificate with prospective employers and your professional network on LinkedIn.

Certificate

Top companies offer this course to their employees

Top companies provide this course to enhance their employees' skills, ensuring they excel in handling complex projects and drive organizational success.

icon-0icon-1icon-2icon-3icon-4

There are 4 modules in this course

This comprehensive course covers ethical hacking techniques and security patch implementation. Students learn to identify and exploit web application vulnerabilities through command injection and SQL injection, while also mastering defensive strategies. The curriculum includes hands-on experience with industry tools like Nessus, Kali Linux, and Metasploit Framework. Through practical exercises, learners develop skills in vulnerability scanning, penetration testing, and implementing security patches across various systems.

Injection Web App Attacks and Their Defenses

Module 1 · 3 Hours to complete

Hack SQL Databases and Patch Web Apps with SQL Injection Vulnerabilities

Module 2 · 4 Hours to complete

Memory Attacks and Defenses

Module 3 · 2 Hours to complete

Penetration Testing

Module 4 · 4 Hours to complete

Fee Structure

Instructor

Edward Chow
Edward Chow

4.3 rating

98 Reviews

1,23,746 Students

8 Courses

Distinguished Expert in Cybersecurity and Network Systems

Edward Chow serves as Professor of Computer Science at the University of Colorado Colorado Springs, bringing over three decades of expertise in network security and system design. After earning his Ph.D. from the University of Texas at Austin in 1985, he worked at Bell Communications Research before joining UCCS in 1991. His research focuses on improving security, reliability, and performance of network systems, leading to two US patents in distributed network restoration and survivable architecture. On Coursera, he leads the Advanced System Security Design Specialization, which has attracted over 9,207 students, teaching courses in cloud computing security, TOR networks, and DDoS defense. His recent innovations include developing efficient Internet Security protocols for online storage systems and creating secure information sharing systems using attribute certificates. His current work involves Software Defined Networks for defending against DDoS attacks and enhancing data security through right path right place data delivery (R2D2). His contributions extend to assistive technologies, combining Laban dance notation with wireless sensor-based human motion tracking systems for rehabilitation care.

Hacking and Patching

This course includes

15 Hours

Of Self-paced video lessons

Intermediate Level

Completion Certificate

awarded on course completion

Free course

Testimonials

Testimonials and success stories are a testament to the quality of this program and its impact on your career and learning journey. Be the first to help others make an informed decision by sharing your review of the course.

4 course rating

269 ratings

Frequently asked questions

Below are some of the most commonly asked questions about this course. We aim to provide clear and concise answers to help you better understand the course content, structure, and any other relevant information. If you have any additional questions or if your question is not listed here, please don't hesitate to reach out to our support team for further assistance.