Power BI Fundamentals - Create visualizations and dashboards from scratch
Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Dive into the sixth episode of a penetration testing tutorial series focused on the "Nibbles" challenge. Learn how to conduct a comprehensive security assessment by reviewing nmap scan results, utilizing searchsploit to identify potential exploits, enumerating and exploiting vulnerabilities on port 80, and exploring Linux privilege escalation techniques. Gain practical insights into ethical hacking methodologies and enhance your cybersecurity skills through this hands-on demonstration.
Syllabus
- Introduction.
- Reviewing the nmap scan.
- Using searchsploit to find exploits.
- Enumerating and exploiting port 80.
- Looking into Linux privilege escalation.
Taught by
The Cyber Mentor