Mohamed Atef – The Art of Exploitation
$5.00$12.00 (-58%)
Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience
Mohamed Atef – The Art of Exploitation
Check it out: Mohamed Atef – The Art of Exploitation
The Art of Exploitation
Learn how to exploit from scrtach
The Art of Exploitation is one of the most sophisticated attacks in Ethical Hacking. In this course, students will learn from scratch how to find a vulnerability or weakness in any system
Your Instructor
Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.
CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+
Professional Experience
Course Curriculum
- 1- Art Of Exploitation Introduction (1:54)
-
2- What is a Vulnerability and Exploit (4:20)
- 3- Search for Vulnerability and its Exploit (8:03)
- 4. Exploit the Vulnerability (10:33)
- 5- Metasploit (5:39)
- 6- Fast Track (9:46)
- 7- Armitage (8:35)
-
8- What is Buffer Overflow (5:33)
-
9- How to search for Buffer Overflow part 2 (7:40)
- 10 How to search for Buffer Overflow part 2 (6:23)
- 11- Buffer Overflow Part 1 (10:12)
- 12- Buffer Overflow Part 2 (11:42)
- 13- Buffer Overflow Part 3 (11:35)
- 14- Buffer Overflow Part 4 (15:48)
- 15- Buffer Overflow Part 5 (16:37)
- 16- Buffer Overflow Part 6 (13:27)
- 17- Buffer Overflow Part 7 (12:51)
- 18- Another Buffer Overflow Example (6:33)
- 19- Buffer Overflow Exercise (1:51)