Ethical Hacking: Exploits

Ethical Hacking: Exploits

Streaming Video - 2017
Rate this:
Learn how to identify vulnerabilities in your system by performing ethical hacking for exploits. Cybersecurity expert Malcolm Shore explains how malware works and demonstrates how penetration testers can debug systems and address susceptible areas.
In addition to damaging and disabling computers, malware (malicious software) can compromise the security of stored data and can spread to other machines. To protect the integrity of networks and systems, penetration testers benefit from learning how malware works. In this course, cybersecurity expert Malcolm Shore discusses how to avoid being hacked or attacked by explaining the mechanics of malware and other exploits-harmful software that takes advantage of flaws. Malcolm shows how to test if your organization's network is vulnerable, a crucial skill for IT security professionals. He also demonstrates how to use basic and advanced debugging tools by taking you through the uses for each. Note: Learning about ethical hacking for exploits is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
Publisher: Carpenteria, CA 2017
Copyright Date: �2017
Additional Contributors: (Firm)

Related Resources


From the critics

Community Activity


Add a Comment

There are no comments for this title yet.


Add Age Suitability

There are no ages for this title yet.


Add a Summary

There are no summaries for this title yet.


Add Notices

There are no notices for this title yet.


Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number


Subject Headings


Find it at MCPL

To Top