Play by Play: Ethical Hacking - Deconstructing the Hack

In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. We don't just talk, we take these incidents and explore the mechanics of how the underlying risks are exploited.
Course info
Rating
(53)
Level
Beginner
Updated
Sep 26, 2016
Duration
1h 29m
Table of contents
Description
Course info
Rating
(53)
Level
Beginner
Updated
Sep 26, 2016
Duration
1h 29m
Description

Attacks against information systems have become the established norm for online assets these days. Hacktivists, career criminals, and nation states are all actively compromising our systems with unprecedented regularity, but for many technology professionals, the risks to them remain hypothetical; they hear about these incidents on the news but don't get exposure to how the attacks are actually executed. In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. But we don't just talk, we take these incidents and explore the mechanics of how the underlying risks are actually exploited. It's a real world, very practical look at the state of online security as we deconstruct the hacks.

About the author
About the author

Gary Eimerman is VP of IT Pro Content at Pluralsight. He brought his expertise over from TrainSignal, where he spent eight years helping to grow the company into the leader in online IT training.

More from the author
More courses by Gary Eimerman
About the author

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.

More from the author
Ethical Hacking: Denial of Service
Beginner
2h 50m
Sep 17, 2019
Ethical Hacking: SQL Injection
Beginner
5h 26m
Sep 16, 2019
Ethical Hacking: Session Hijacking
Beginner
3h 28m
Sep 16, 2019
More courses by Troy Hunt
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Welcome to this Play by Play with Pluralsight. A Play by Play is a course where we sit down with an expert and take on a technical challenge in real time. In this Play by Play, we sit down with security expert, Troy Hunt to discuss some of the highest profile hacks in recent history, including TalkTalk, Ashley Madison, Sony Pictures, and Nissan. We discuss the hacks, we explore the mechanics of how these exploits happened, and discuss ways that we as security professionals, developers, and admins can mitigate these risks in our own environments. This course is the perfect supplement to Pluralsight's Ethical Hacking series where you can dive deeper into each of the topics we discuss. Whether it be criminal, in capital gains, or hacktivism, our apps, networks, and data are under attack. Join us as we learn from the misfortunes of others to help improve our own safety in this digital world.