Jump to content
Usr6

Learning Exploitation with Offensive Computer Security 2.0

Recommended Posts

Video Preview

 

Introduction
Secure C 101
Secure C 102
Secure C 103
Code Auditing
Linux & Permissions Spectrum
Windows Overview
Rootkits
Reverse Engineering 101
Reverse Engineering 102
Fuzzing 101
Midterm Review
Fuzzing 102
Exploitation 101
Exploitation 102
Exploitation 103
Networking 101
Networking 102
Web Exploitation 101
Web Exploitation 102
Web Exploitation 103
Exploitation 104
Exploitation 105
Exam 2 Review
Exploitation 106
History of Exploitation
Exploitation 107
Social Engineering & Physical Security
Digital Forensics & Incident Response
Tying All The Things Together

 

http://howto.hackallthethings.com/2016/07/learning-exploitation-with-offensive.html

  • Upvote 4
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...