Session Hijacking








Are you preparing for an ethical hacking course or certification? Take professional cybersecurity instructor Ken Underhill’s Session Hijacking course. Learn about how an attacker takes over a session between a user and host. Explore hands-on virtual lab activities to strengthen your session hijacking skills.

Add your review

Course Description

We will cover basic information about session hijacking in Module 1. Since this is a skill-based course, we will then move into performing hands-on labs in Module 2. You will also learn how to set up and configure your own virtual environment for performing the example lab provided. The course will culminate with an assessment lab that students will need to perform (found in the supplemental resources section). Knowledge of session hijacking can be beneficial to defenders

however, this course is intended for ethical hackers (attackers). This course will be most beneficial for students that are studying for penetration testing related certifications, like the EC-Council Certified Ethical Hacker (CEH), CompTIA Pentest+, GPEN, or OSCP.

Students should be familiar with common IT and cybersecurity terminology. Students should also have basic computer knowledge and an understanding of basic computer networking. Students will also need access to Cybrary labs to complete the hands-on part of this course.

By the end of this course, students should be able to:

Course Goals

By the end of this course, students should be able to:

Explain what session hijacking is

Perform a session hijacking attack

Module 1: Introduction

Module 2: Session Hijacking Lab

Module 3: Conclusion

User Reviews

0.0 out of 5
Write a review

There are no reviews yet.

Be the first to review “Session Hijacking”


    Your Email (required)

    Report this page
    Skip to content