Exploitation and Mitigation: Ghostcat (CVE-2020-1938)
If you're a cybersecurity practitioner that wants to know more about how to exploit and defend against Ghostcat (CVE-2020-1938), the you won't want to miss this course. You will be able to identify the vulnerability, attack it, and even mitigate it in a hands-on, secure lab environment. Don't let Ghostcat catch you off guard.
Cybrary’s new Exploitation and Mitigation: Ghostcat (CVE-2020-1938) course gives experienced cybersecurity practitioners, in both offensive and defensive security roles, the opportunity to explore this potentially high-risk vulnerability. Our course explains and walks through the steps for identifying Ghostcat from the perspective of both the attacker and the defender, and demonstrates techniques for exploiting and mitigating the vulnerability.
Exploitation and Mitigation: Ghostcat (CVE-2020-1938) offers a unique learning experience by providing secure, browser-based virtual lab environments specifically designed for you to practice implementing techniques to identify, attack, and defend against Ghostcat.
Cybrary’s Exploitation and Mitigation: Ghostcat (CVE-2020-1938) course is best suited for penetration testers, cybersecurity analysts, and cybersecurity engineers familiar with basic networking and Linux system administration tasks as well as system administrators who possess an understanding of fundamental cybersecurity concepts.
The MSHTML Windows remote code execution vulnerability (CVE-2021-40444) identified in September 2021 could allow a ...
Hive Nightmare (CVE-2021-36934) is a serious vulnerability that gives threat actors access to sensitive data ...