Cyber Security Exploiting Course
Learn and understand CEH Cyber Security Exploiting!What you'll learn
- Getting Comfortable with Kali Linux
- The Essential Tools
- Passive Information Gathering
- Linux Buffer Overflow Exploitation
- Working with Exploits
- Client Side Attacks