Mohamed Atef – The Art of Exploitation

$5.00$12.00 (-58%)

In stock

SalePage

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience

Mohamed Atef - The Art of Exploitation

Mohamed Atef – The Art of Exploitation

Check it out: Mohamed Atef – The Art of Exploitation

The Art of Exploitation

Learn how to exploit from scrtach

The Art of Exploitation is one of the most sophisticated attacks in Ethical Hacking. In this course, students will learn from scratch how to find a vulnerability or weakness in any system

Your Instructor

Mohamed Atef

Mohamed Atef

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience.
CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+

Professional Experience

Course Curriculum

Introduction
  • 1- Art Of Exploitation Introduction (1:54)
Vulnerability and Exploit
  • 2- What is a Vulnerability and Exploit (4:20)

  • 3- Search for Vulnerability and its Exploit (8:03)
  • 4. Exploit the Vulnerability (10:33)
  • 5- Metasploit (5:39)
  • 6- Fast Track (9:46)
  • 7- Armitage (8:35)
Buffer Overflow
  • 8- What is Buffer Overflow (5:33)

  • 9- How to search for Buffer Overflow part 2 (7:40)

  • 10 How to search for Buffer Overflow part 2 (6:23)
  • 11- Buffer Overflow Part 1 (10:12)
  • 12- Buffer Overflow Part 2 (11:42)
  • 13- Buffer Overflow Part 3 (11:35)
  • 14- Buffer Overflow Part 4 (15:48)
  • 15- Buffer Overflow Part 5 (16:37)
  • 16- Buffer Overflow Part 6 (13:27)
  • 17- Buffer Overflow Part 7 (12:51)
  • 18- Another Buffer Overflow Example (6:33)
  • 19- Buffer Overflow Exercise (1:51)

Main Menu

Mohamed Atef - The Art of Exploitation

Mohamed Atef - The Art of Exploitation

$5.00$12.00 (-58%)

Add to Cart