MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 791 MB
Genre: eLearning | Language: English
This is part three of a four-part series designed to help you prepare for the International Council of E-Commerce Consultant's Certified Ethical Hacker (CEH) exam. It teaches you how to exploit operating systems, applications, networks, databases, and mobile devices. You'll come away with the knowledge you need to master the CEH exam objectives related to system hacking, denial of service, hacking Web apps, SQL injection, and cross site scripting.
Course participants should have a basic understanding of TCP/IP and Ethernet networking, plus core familiarity with the Windows and Linux operating systems.
Learn how to craft the exploits used by ethical hackers to perform real world pen tests
Discover how to build and deliver exploit payloads using techniques like buffer overflows
Understand the methods for conducting SQL Injection based exploits
Explore attack techniques like fuzzing and know how to ethically hack mobile devices