Exploitation
Home
>
Computer Science
>
Computer Security and Cryptography
>
Vulnerability Analysis
>
Exploitation
This includes understanding how hackers exploit vulnerabilities in a system.