• Classroom
  • Online, Instructor-Led
Course Description

This program prepares students with the knowledge, skills, and practice to function as a cybersecurity pen tester. Penetration testers are security experts who act like bad guys to identify weaknesses in a network. These weaknesses, also called vulnerabilities, must be managed properly to avoid compromise. Penetration testing and vulnerability management helps prevent cyberattacks.

Learning Objectives

  1. Attackers are sophisticated and unpredictable, so it's important to try and understand their motives and approach. Penetration testers are security experts who act like bad guys to identify weaknesses in a network. These weaknesses, also called vulnerabilities, must be managed properly to avoid compromise. Penetration testing and vulnerability management helps prevent cyberattacks.

Framework Connections

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.