Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
2016 State of Vulnerability Exploits
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Number of vulnerabilities
- 4 What is a vulnerability
- 5 What is an exploit
- 6 Exploit Databases
- 7 Exploit Kits
- 8 Exploit Kit Example
- 9 Exploit Kit Web UI
- 10 Top Exploit Kits
- 11 How can we defend
- 12 Most affected vendors
- 13 Targeted OS
- 14 Local vs Removed
- 15 Exploit Trends
- 16 Local vs Remote
- 17 Lateral Movement
- 18 Examples
- 19 Why this is important
- 20 Exploits for endoflife applications
- 21 Endoflife application
- 22 Prioritization
- 23 Exploit Kit
- 24 What can we do
- 25 Outro