• Online, Self-Paced

Learning Objectives

  • Describe what ethical hacking is and identify the methodology and tools for performing penetration tests
  • Describe network architecture
  • Define TCP/IP protocol
  • Describe the steps for conducting a penetration test.
  • Identify common vulnerabilities and types of attacks
  • Describe information gathering techniques and reconnaissance tools
  • Identify vulnerabilities by accessing and searching databases
  • Describe and use common vulnerability assessment tools.
  • Describe what to report to a customer after completing a vulnerability assessment or penetration test.
  • Evaluate the design of a network for flaws and weaknesses.
  • Explain how the weaknesses and flaws of VPN and VLAN systems could result in potential attacks.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):