Exploit Ethical Hacker’s Guide
Learn and understand CEH using this course. Get your CEH certificate!
What you’ll learn
-
Getting Comfortable with Kali Linux
-
The Essential Tools
-
Passive Information Gathering
-
Linux Buffer Overflow Exploitation
-
Working with Exploits
-
Client Side Attacks
Requirements
-
No prerequisites for this course – A computer with Internet
Who this course is for:
- Beginner hackers