Exploit Ethical Hacker's Guide
What you'll learn
- Getting Comfortable with Kali Linux
- The Essential Tools
- Passive Information Gathering
- Linux Buffer Overflow Exploitation
- Working with Exploits
- Client Side Attacks
Requirements
- No prerequisites for this course - A computer with Internet
Description
With the skills you gain here, you’re equipped to pursue the Security+ certification from CompTIA.The Security+ Certification by CompTIA is an international and vendor-neutral certification that has been endorsed and recognized by industry computing manufacturers and organizations. This course provides foundational knowledge of the principles, techniques, and tools needed to successfully prepare for the SY0-401 exam. With the skills you gain here, you’re equipped to pursue a number of security certifications including the Security+ from CompTIA and the CEH from EC-Council.
Who this course is for:
- Beginner hackers
Course content
- Preview03:08
- Preview05:46
- Preview05:53
- 05:59Passive Information Gathering
- 05:28Linux Buffer Overflow Exploitation
- 05:19Working with Exploits
- 05:25Client Side Attacks
Instructors
My name is Pronoy Kumar. I am a computer engineer. I am a very experienced web developer and working in some of the biggest companies of the world for a long time. Online teaching is my passion. I am making online video tutorials since 2008 and got a very good response. That's why now i want to share my knowledge and experience that i have gained in my 10 years long it career. My courses are very informative, updated and well designed. My main goal is to help people by providing them good educational resources.
Hello, My name is Marufa Yasmin. I am a professional web developer. I am working as a web developer for a long time and also i have worked for some of the best company of the world. Now i want to share my valuable knowledge using online courses. In my courses i will assume that you have no prior knowledge but at the end you shall learn the subject very well.