Buffer Overflow
Class
Jeffrey Jusino
Access code required
Enroll
C)PEH Vulnerability Assesment
Here is the class outline:
1. Vulnerability Assesments
Nov 1
Is the process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use. |