Study any time, from any device.

Exploiting Network and Application Vulnerabilities

Explore system weak points and methods of attack with this four-video course on exploiting network and application vulnerabilities.

4 videos  //  47 minutes of training

Course description

A weakness is only a weakness if the enemy knows about it — and as a pentester, it’s your job to play the enemy. In this course, four videos will reintroduce you to the art of exploiting network and application vulnerabilities. Take a closer look at man-in-the-middle attacks, Denial-of-Service (DoS) and Distributed-Denial-of-Service (DDoS), evil twin attacks, credential harvesting and the weak points in networks, wireless networks and applications. Includes definitions and demonstrations.

Course syllabus

Network-Based VulnerabilitiesDuration: 13:46

Wireless-based VulnerabilitiesDuration: 8:46

Wireless Network Attack DemonstrationDuration: 5:50

Application-Based VulnerabilitiesDuration: 18:52

Meet the author

Jason Dion


Jason Dion specializes in actionable information you can use to further your Cyber Security and Information Technology career. He provides IT certification and training videos to help students prepare for a career in the Information Technology and Cyber Security field, providing you with the real world training and application to today's cyber security challenges.

Jason Dion, CISSP No. 349867, is an Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile, and ITIL.

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer