*** Proof of Product ***
Exploring the Essential Features of “Mohamed Atef – The Art of Exploitation”
The Art of Exploitation Course
Learn how to exploit from scrtach
The Art of Exploitation is one of the most sophisticated attacks in Ethical Hacking. In this course, students will learn from scratch how to find a vulnerability or weakness in any system
Your Instructor
Mohamed Atef
Cyber Security Consultant / Certified Instructor with more than 20 years of experience implementing and managing Cyber Security project such as:
- ISMS Implementation
- CS Standards / Compliance
- Security Operation Center
- BCP/DRP
- Penetration Testing
- CS Enterprise Technical Solutions
3 Books published
14 best sellers online courses
Course Curriculum
Introduction
1- Art Of Exploitation Introduction (1:54)
Vulnerability and Exploit
2- What is a Vulnerability and Exploit (4:20)
3- Search for Vulnerability and its Exploit (8:03)
4. Exploit the Vulnerability (10:33)
5- Metasploit (5:39)
6- Fast Track (9:46)
7- Armitage (8:35)
Buffer Overflow
8- What is Buffer Overflow (5:33)
9- How to search for Buffer Overflow part 2 (7:40)
10 How to search for Buffer Overflow part 2 (6:23)
11- Buffer Overflow Part 1 (10:12)
12- Buffer Overflow Part 2 (11:42)
13- Buffer Overflow Part 3 (11:35)
14- Buffer Overflow Part 4 (15:48)
15- Buffer Overflow Part 5 (16:37)
16- Buffer Overflow Part 6 (13:27)
17- Buffer Overflow Part 7 (12:51)
18- Another Buffer Overflow Example (6:33)
19- Buffer Overflow Exercise (1:51)
Please see the full list of alternative group-buy courses available here: https://lunacourse.com/shop/