Home
/ IT & Computer Science / Business Technology / Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks / A cyber hacker's toolkit: exploitation
This article is from the free online
Cyber Security for Small and Medium Enterprises: Identifying Threats and Preventing Attacks
![](https://ugc.futurelearn.com/uploads/images/99/cf/promo_small_99cfc930-c496-4492-92d5-ce946aac3490.jpg)
Reach your personal and professional goals
Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.
Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.