Skip to content

Buffer Overflow

Jeffrey Jusino
Access code required

C)PEH Vulnerability Assesment

Here is the class outline:

1. Vulnerability Assesments

Nov 1

Is the process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use.

Back to top