This course provides a hands-on application of common tools used during penetration assessments and of the specialized security tools available. Providing an opportunity to create a custom tool or extension to a known tool.
Describe cyber security and be aware of the current threat environment
Identify and discuss current and past cyber threats
Recognize and describe cyber compliance
About this course:
This course provides a hands-on application of common tools used during penetration assessments and of the specialized security tools available. It also provides an opportunity to create a custom tool or extension to a known tool. Begining with an overview of the offensive attack profile, the risks associated, and the strategy behind penetration testing, exercises build on top of each other and walk students through the offensive steps taken during a professional penetration test.
We use cookies to understand how you use our site and to improve your experience, including personalizing content and to store your content preferences. By continuing to use our site, you accept our use of cookies.
Read our privacy policy.