Take this
course

Software Development / Security & Encryption

Advanced Exploitation Techniques

Learn what advanced exploitation techniques there are and how you can use them in your penetration testing.

Description

Exploit is a common term in the computer security community that refers to a piece of software that takes advantage of a bug or glitch. 


In this Advanced Exploitation Techniques course you will learn what advanced exploitation techniques are and how you can use them in your penetration testing. You will also learn how to use Metasploit to exploit vulnerabilities. This will be coupled with in-depth demos on using Metasploit and other Metasploit tools, such as, Meterpreter, Armitage, and Armitage-mimkatz.


Topics Covered Include:

  • Advanced Exploiting Techniques
  • Penetration Testing
  • Exploits 

Take Advantage of our extra downloadable supplemental materials. 

**This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Advanced Exploitation Techniques.

Full details

Curriculum

  • Advanced Exploiting Techniques
    Introduction to Exploits
    4:03
    Metasploit
    2:20
    DEMO: Metasploit
    4:00
    Understanding Metasploit
    5:51
    Armitage
    2:00
    DEMO: Meterpreter
    8:22
  • Penetration Testing
    Metasploit
    1:54
    DEMO: Armitage
    4:46
    Hands on Metasploit
    1:03
  • Exploits
    Exploiting Vulnerabilities
    1:42
    Payload
    1:44
    DEMO: Armitage-mimkatz
    4:28
    Core Impact Pro
    2:55
  • Conclusion
    Advanced Exploitation Techniques: Supplemental Materials
    Take advantage of all our extra downloadable supplemental materials. This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Advanced Exploitation Techniques Chapters 1 - 3.

Skills

  • Certified Ethical Hacker (CEH)
  • CompTIA Security+
  • IT Security
  • IT Security Certification
  • Information Security
  • Information Systems Security

Similar Courses

More Courses by this Instructor