You can name threats and vulnerabilities. You can match them with countermeasures and hacking tools. Now practice using the tools and tricks that make an ethical hacker great! This course is 100% hacking. Our expert instructor will be present to guide your experience and answer your questions, but your time will be spent with your fingers on a keyboard!
Learning Objectives
Upon course completion, students should have the knowledge to name threats and vulnerabilities while matching them with counter measures and hacking tools. This will prepare students to quickly act and detect weaknesses and vulnerabilities within network infrastructures.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Exploitation Analysis
- Systems Administration
- Systems Analysis
- Threat Analysis
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.