• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

IT & Software Ethical Hacking: Exploits | Lynda (1 Viewer)

Currently reading:
 IT & Software Ethical Hacking: Exploits | Lynda (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

protectaccount

Member
Amateur
LV
3
Joined
Nov 21, 2025
Threads
589
Likes
56
Awards
8
Credits
13,533©
Cash
0$

5EBTZqO.jpg

In addition to damaging and disabling computers, malware (malicious software) can compromise the security of stored data and can spread to other machines. To protect the integrity of networks and systems, penetration testers benefit from learning how malware works. In this course, cybersecurity expert Malcolm Shore discusses how to avoid being hacked or attacked by explaining the mechanics of malware and other exploits—harmful software that takes advantage of flaws. Malcolm shows how to test if your organization’s network is vulnerable, a crucial skill for IT security professionals. He also demonstrates how to use basic and advanced debugging tools by taking you through the uses for each.

Note: Learning about ethical hacking for exploits is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.

Topics include:

Writing assembler programs
Using debugging programs
Controlling flow
Executing code from the data section
Ethical attacking to identify vulnerabilities
State-sponsored attacks
Using Metasploit
Adding new exploits to Metasploit
Using Armitage

Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom