• Online, Self-Paced
Course Description

Gathering information regarding network vulnerabilities is a critical step in thwarting potential exploits. Explore network reconnaissance and security policies, including logging, traffic intercepts, and hacking techniques.

Learning Objectives

{"explain how to discover network devices"}

Framework Connections