
네트워크 패킷 분석 입문 및 악성코드 샘플 분석
보안프로젝트
악성코드가 배포되는 시점에 제일 어려운것은 스크립트 난독화입니다. 난독화 기법에 대해 이해를 하고, 이를 복호화 한 후에 배포되는 악성코드 실행파일을 분석해보세요
초급
악성코드, 네트워크
It includes module analysis and development stages using the vulnerability analysis framework Metasploit. This is the stage where you can freely use and utilize the modules you created after taking the beginner-intermediate Metasploit course. This is a high-level lecture that you cannot hear anywhere else in Korea or abroad.
Utilizing the Metasploit Framework
How to develop with Metasploit Framework
Advanced use of Metasploit in mock hacking work process
This course covers module analysis and development using the vulnerability analysis framework Metasploit. After completing the beginner-intermediate Metasploit course, you'll be able to freely use and utilize your own modules. This is a high-quality course unavailable anywhere else, domestically or internationally.
Seo Jun-seok
- (Former) Specialist instructor for 'Metasploit Penetration Testing Methods' at SANS Korea
- Co-authored "Security Vulnerability Diagnosis Using Nmap NSE" (Acorn Publishing)
- Hacking Flower Disassembly Translation (Acorn Publishing)
- Hacking Exposed, 7th Edition Translation (Acorn Publishing)
- Translation of the Exploit Writing Tutorial series
This course has prerequisites. Environment setup and basic knowledge can be learned in the courses below: Metasploit Utilization, Analysis, and Utilization.
Who is this course right for?
Vulnerability Analysis Using Metasploit Framework
For those who want to create their own Metasploit modules
For those who want to deepen vulnerability analysis
Need to know before starting?
Introduction to Metasploit
Understanding Vulnerability Analysis
Introduction to Ruby Language Programming
108,587
Learners
3,126
Reviews
441
Answers
4.7
Rating
69
Courses
보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다.
All
29 lectures ∙ (10hr 39min)
Course Materials:
$84.70
Check out other courses by the instructor!
Explore other courses in the same field!