• Online, Self-Paced
Course Description

Gathering information regarding network vulnerabilities is a critical step in thwarting potential exploits. Explore network reconnaissance and security policies, including logging, traffic intercepts, and hacking techniques.

Learning Objectives

Knowledge of cybersecurity policies and procedures

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):