Ethical Hacking: Exploits

Ethical Hacking: Exploits

Streaming Video - 2017
Rate this:
Learn how to identify vulnerabilities in your system by performing ethical hacking for exploits. Cybersecurity expert Malcolm Shore explains how malware works and demonstrates how penetration testers can debug systems and address susceptible areas.
In addition to damaging and disabling computers, malware (malicious software) can compromise the security of stored data and can spread to other machines. To protect the integrity of networks and systems, penetration testers benefit from learning how malware works. In this course, cybersecurity expert Malcolm Shore discusses how to avoid being hacked or attacked by explaining the mechanics of malware and other exploits-harmful software that takes advantage of flaws. Malcolm shows how to test if your organization's network is vulnerable, a crucial skill for IT security professionals. He also demonstrates how to use basic and advanced debugging tools by taking you through the uses for each. Note: Learning about ethical hacking for exploits is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge.
Publisher: Carpenteria, CA lynda.com 2017
Copyright Date: �2017
Additional Contributors: Lynda.com (Firm)

Related Resources


Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age

Add Age Suitability

There are no ages for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number

Recommendations

Subject Headings

  Loading...

Find it at MCPL

  Loading...
[]
[]
To Top