Exploit Ethical Hacker's Guide
Learn and understand CEH using this course. Get your CEH certificate!
What you'll learn
- Getting Comfortable with Kali Linux
- The Essential Tools
- Passive Information Gathering
- Linux Buffer Overflow Exploitation
- Working with Exploits
- Client Side Attacks
0 Comments
if you have any doubt please comment