Fundamentals of Exploitation
Build your knowledge of exploitation, including types of exploits, overflows and privilege escalation, as well as tools and techniques related to ethical hacking.
Seven videos take you through the fundamentals of exploiting a system. Get a close look at what exploits are, how they work, the various types of exploits and much, much more. Individual modules on the fundamentals, buffer overflows, privilege escalation, Metasploit, client-side exploits, social engineering and attacking border devices cover the challenges of exploitation in detail, including vulnerability types, countermeasures, vertical versus horizontal privilege escalation, DLL hijacking, Denial of Service (DoS) and even finding ways to physically enter the target company without their knowledge.
Fundamentals of Exploitation - Types of ExploitsDuration: 14:33
Fundamentals of Exploitation - OverflowsDuration: 6:56
Fundamentals of Exploitation - Privilege EscalationDuration: 6:52
Client Side ExploitsDuration: 3:43
Social EngineeringDuration: 5:46
Attacking Border DevicesDuration: 6:15
Meet the author
At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certification and skills training. We also empower all employees with security awareness training to stay cybersecure at work and home. Driven by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.
You're in good company.
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"The course not only met my expectations, but exceeded them. It was the most engaging online training I’ve ever had."
"I’ve taken five boot camps with Infosec and all my instructors have been great."