Ethical hacking : hacking applications / Chad Russell.
Publisher: [Place of publication not identified] : Stone River eLearning, 2017Description: 1 online resource (1 streaming video file (1 hr., 14 min., 12 sec.)) : digital, sound, colorContent type:- two-dimensional moving image
- computer
- video
- online resource
- Hacking applications
- QA76.9.A25

Presenter, Chad Russell.
Title from resource description page (Safari, viewed November 28, 2017).
"This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as the Zed Attack Proxy, Hamster and Ferret. Next you will learn how to conduct XSS attacks, buffer overflows and then learn how to hack AJAX."--Resource description page.