From the course: Ethical Hacking: Session Hijacking
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Next steps - Linux Tutorial
From the course: Ethical Hacking: Session Hijacking
Next steps
- [Malcolm] I'd really like to thank you for joining me for this course. I hope you enjoyed learning about session hijacking. There's always something new in cybersecurity and if you're interested in learning more, then check out the full cybersecurity ethical hacking segments of the library, where the new security testing courses are added regularly. You'll find courses on using Kali Linux, information gathering, denial of service, and much more. I'd also like to invite you to go to my author page where you can find some additional courses on cybersecurity. If you want to get hands-on with some of the common tools, then do take a look at Cybersecurity for IT Professionals and the Introduction to Kali Linux. If you're wanting to learn about security for the cloud, then Cybersecurity for Cloud Computing is for you. You might also want to see what my colleague in the cybersecurity ethical hacking series, Lisa Bock, has for you on her homepage. Thanks again for joining me on this course…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.