• Online, Instructor-Led
  • Classroom
Course Description

This course will teach how to attack, exploit, evade, and defend enterprise network environments. Build your own exploits as well as PenTest OT, and IoT systems. You’ll learn to double pivot to access hidden networks, create your own tools, conduct advanced binaries exploitation, and customize scripts and exploits to get into the innermost segments of the network.

Learning Objectives

Prepare for certification and enhance skillset

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):