Need to create a pen test final report? In this course, learn how to properly pre-plan and execute a successful pen test following the client’s scope of work.
If you are looking for the most practical way into the exploit development and software security world look no further. The Exploit Development Student Learning Path provides not only the fundamentals of Windows and Linux exploit development but also covers advanced Windows and Linux exploit development techniques, as well as anti-exploit mechanism bypasses.
This course focuses on the tools, techniques and procedures to monitor 802.11ac/n networks. We will be learning about both USB and Access Point hardware, pros and cons, and scalable architectures. We will be looking at different hardware for monitoring ranging in price from $40 to $350 and above, both USB and Access Point solutions.
This course focuses on Open Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they are interested in:
Gaining a better understanding of OSINT techniques