Video DescriptionThis course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX.
Table of Contents
- Hacking Applications
- Title: Ethical Hacking: Hacking Applications
- Release date: October 2017
- Publisher(s): Stone River eLearning
- ISBN: 100000006A0717