• Classroom
  • Online, Instructor-Led
Course Description

You can name threats and vulnerabilities. You can match them with countermeasures and hacking tools. Now practice using the tools and tricks that make an ethical hacker great! This course is 100% hacking. Our expert instructor will be present to guide your experience and answer your questions, but your time will be spent with your fingers on a keyboard!

Learning Objectives

Upon course completion, students should have the knowledge to name threats and vulnerabilities while matching them with counter measures and hacking tools. This will prepare students to quickly act and detect weaknesses and vulnerabilities within network infrastructures.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Exploitation Analysis
  • Systems Administration
  • Systems Analysis
  • Threat Analysis
  • Vulnerability Assessment and Management