CG数据库 >> Certified Ethical Hacker (CEH): Platform Penetration

Certified Ethical Hacker (CEH): Platform PenetrationMP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 791 MBGenre: eLearning | Language: EnglishThis is part three of a four-part series designed to help you prepare for the International Council of E-Commerce Consultant's Certified Ethical Hacker (CEH) exam.

It teaches you how to exploit operating systems, applications, networks, databases, and mobile devices.

You'll come away with the knowledge you need to master the CEH exam objectives related to system hacking, denial of service, hacking Web apps, SQL injection, and cross site scripting.

Course participants should have a basic understanding of TCP/IP and Ethernet networking, plus core familiarity with the Windows and Linux operating systems.

Learn how to craft the exploits used by ethical hackers to perform real world pen testsDiscover how to build and deliver exploit payloads using techniques like buffer overflowsUnderstand the methods for conducting SQL Injection based exploitsExplore attack techniques like fuzzing and know how to ethically hack mobile devices


Certified Ethical Hacker (CEH): Platform Penetration的图片1
Certified Ethical Hacker (CEH): Platform Penetration的图片2

发布日期: 2017-12-23