You can name threats and vulnerabilities. You can match them with countermeasures and hacking tools. Now practice using the tools and tricks that make an ethical hacker great! This course is 100% hacking. Our expert instructor will be present to guide your experience and answer your questions, but your time will be spent with your fingers on a keyboard!
Learning Objectives
Upon course completion, students should have the knowledge to name threats and vulnerabilities while matching them with counter measures and hacking tools. This will prepare students to quickly act and detect weaknesses and vulnerabilities within network infrastructures.