Foundation Subscription > Cybersecurity > Cybersecurity: System Exploitation
Course Description
This course discusses system exploitation, or taking over a system by gaining access in some way. This will require an understanding of pre-attack concepts such as discovery, port scanning, or scanning in general. We’ll also talk about enumeration, or gathering detailed information about what has been discovered is on a particular system.
  • Basic understanding of networking terminology and applications, intranet and internet services, protocols, ports, as well as networking and security devices.
  • Basic knowledge in installation of security software, such as antivirus or firewalls, and general understanding of operating systems functionalities (Windows and Linux).
James Michael Stewart
Michael has over 30 years experience with computers and technology with a focus on security, certification, and various operating systems. He has been teaching job skills and certification courses on topics like CISSP, ethical hacking and penetration testing, computer forensics, and Security Plus for over 20 years. He is also the primary author of two books and holds a variety of certifications including CISSP, CEH, CHFI, ECSA, and Security Plus.