- 15 enquiries
- Online
- 30 hours · Self-paced
- Professional certification
Great service
...topic, you will learn how to obtain additional information from network services, Windows and Linux systems, as you prepare to exploit those systems. • Activities include using Windows and Linux command line commands, nmap, netcat, telnet, rpcclient, dirbuster, and Metasploit. 3. Vulnerability
…