Save for later
Ethical Hacking
Exploits
In addition to damaging and disabling computers, malware (malicious software) can compromise the security of stored data and can spread to other machines. To protect the integrity of networks and systems, penetration testers benefit from learning how malware works. In this course, cybersecurity expert Malcolm Shore discusses how to avoid being hacked or attacked by explaining the mechanics of malware and other exploits—harmful software that takes advantage of flaws. Malcolm shows how to test if your organization's network is vulnerable, a crucial skill for IT security professionals. He also demonstrates how to use basic and advanced debugging tools by taking you through the uses for each.
Note: Learning about ethical hacking for exploits is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge. Topics include:
Note: Learning about ethical hacking for exploits is part of the Malware competency from the Certified Ethical Hacker (CEH) body of knowledge. Topics include:
- Writing assembler programs
- Using debugging programs
- Controlling flow
- Executing code from the data section
- Ethical attacking to identify vulnerabilities
- State-sponsored attacks
- Using Metasploit
- Adding new exploits to Metasploit
- Using Armitage
Get a Reminder
Rating | Not enough ratings |
---|---|
Length | 1h 9m |
Starts | On Demand (Start anytime) |
Cost | $0/month (Access to entire library- free trial available) |
From | LinkedIn Learning |
Instructor | Malcolm Shore |
Download Videos | Only via the LinkedIn Learning mobile app |
Language | English |
Subjects | IT & Networking |
Tags | IT Security Linux |
Get a Reminder
Similar Courses
Careers
An overview of related careers and their average salaries in the US. Bars indicate income percentile.
Data Security Investigator $68k
Anti-Malware Engineer $73k
Security/Data Analyst $88k
Data Security Adminstrator $98k
Software/Security Engineer $110k
Software Engineer - Data $114k
Senior Software Engineer/Anti-Malware Research $132k
Malware Researcher $136k
Security Researcher - Software Security Engineer $148k
Software Engineer, Security $152k
Security Data Scientist $160k
Software-Data Engineer $167k
Write a review
Your opinion matters. Tell us what you think.
Please login to leave a review
Rating | Not enough ratings |
---|---|
Length | 1h 9m |
Starts | On Demand (Start anytime) |
Cost | $0/month (Access to entire library- free trial available) |
From | LinkedIn Learning |
Instructor | Malcolm Shore |
Download Videos | Only via the LinkedIn Learning mobile app |
Language | English |
Subjects | IT & Networking |
Tags | IT Security Linux |
Similar Courses
Sorted by relevance
Like this course?
Here's what to do next:
- Save this course for later
- Get more details from the course provider
- Enroll in this course