Course Content

Module 1: Introduction and Background

Module 4: Summary

Course Description

Cybrary’s new Exploitation and Mitigation: Ghostcat (CVE-2020-1938) course gives experienced cybersecurity practitioners, in both offensive and defensive security roles, the opportunity to explore this potentially high-risk vulnerability. Our course explains and walks through the steps for identifying Ghostcat from the perspective of both the attacker and the defender, and demonstrates techniques for exploiting and mitigating the vulnerability. Exploitation and Mitigation: Ghostcat (CVE-2020-1938) offers a unique learning experience by providing secure, browser-based virtual lab environments specifically designed for you to practice implementing techniques to identify, attack, and defend against Ghostcat. Cybrary’s Exploitation and Mitigation: Ghostcat (CVE-2020-1938) course is best suited for penetration testers, cybersecurity analysts, and cybersecurity engineers familiar with basic networking and Linux system administration tasks as well as system administrators who possess an understanding of fundamental cybersecurity concepts.

Provided By


Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a Exploitation and Mitigation: Ghostcat (CVE-2020-1938) Certificate of Completion