Learn how to recognize and describe cyber compliance
Discuss best practices for contextualizing past and current cyber threats
About this course:
This hands-on course explores common and specialized security tools used during penetration assessments. Beginning with an overview of the offensive attack profile, the risks associated, and the strategy behind penetration testing, students will complete progressive exercises on the offensive steps taken during a professional penetration test. Topics covered will include: setting up virtual machines for testing; testing methodologies; vulnerability scanning; exploitation; Metasploit; and cross-site scripting (CSS). Students will have the opportunity to create their own custom tool or an extension to a known tool.