Study any time, from any device.

Preparing for Exploitation

Three videos help you prepare for exploitation with an in-depth review of common attack techniques, leveraging information for exploitation and weaknesses in specialized systems.

3 videos  //  20 minutes of training

Course description

As you lay your plans for a pentest, it’s a good idea to review what you know and what you need to do. In this course, three videos will take you through the fundamentals of preparing for exploitation. Beginning with leveraging information for exploit, you’ll look at common attack techniques (cross-compiling code, exploit chaining, social engineering and more) and known weaknesses in specialized systems such as the Internet of Things, embedded devices and even Industrial Control Systems (ICS) and retail Point-of-Sale systems.

Course syllabus

Leveraging Information for ExploitDuration: 3:19

Common Attack TechniquesDuration: 6:23

Weaknesses in Specialized SystemsDuration: 10:29

Meet the author

Jason Dion


Jason Dion specializes in actionable information you can use to further your Cyber Security and Information Technology career. He provides IT certification and training videos to help students prepare for a career in the Information Technology and Cyber Security field, providing you with the real world training and application to today's cyber security challenges.

Jason Dion, CISSP No. 349867, is an Instructor at Liberty University’s College of Engineering and Computational Science and Anne Arundel Community College’s Department of Computing Technologies with multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), Security+, Network+, A+, PRINCE2, PRINCE2 Agile, and ITIL.

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer