• Classroom
  • Online, Instructor-Led
Course Description

This course exposes students to all manner of reconnaissance, scanning, enumeration, exploitation and pillaging for 802.3 networks. Additionally, the topics expose students to a variety of recon, discovery, scanning, enumeration, exploitation, post-exploitation, pillaging, covering one’s tracks and persistence.

Learning Objectives

Provide in-depth exposure and hands-on practice with all facets of 802.3 hacking, vulnerability research, pivoting, exploitation, password/hash cracking, post-exploitation pillaging and methods of setting up persistence on a victim’s network

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):