Autoplay
Autocomplete
Previous Lesson
Complete and Continue
C)PTC: Certified Penetration Testing Consultant (UC)
Certified Penetration Testing Consultant
Module 1 – Penetration Testing Team Formation (32:00)
Module 2 – NMAP Automation (31:28)
Module 3 – Exploitation Process (21:43)
Module 4 – Fuzzing with Spike (22:51)
Module 5 – Simple Buffer Overflow (22:51)
Module 6 – Stack Based Windows Buffer Overflow (60:16)
Module 7 – Web Application Security and Exploitation (21:41)
Module 8 – Linux Stack Smashing & Scanning (19:55)
Module 9 – Linux Address Space Layout Randomization (24:54)
Module 10 – Windows Exploit Protection (26:31)
Module 11 – Getting AroundSEH ASLR (36:17)
Module 12 – Penetration Testing Report Writing (32:41)
Teach online with
Module 10 – Windows Exploit Protection
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock