• Online, Instructor-Led

Learning Objectives

After taking this course, you will be able to:

PHASE 1 Vulnerability Assessment

  • Foot Printing & Reconnaissance
  • Scanning
  • Enumeration
  • Vulnerability Analysis

PHASE 2 Gaining Access

  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service

PHASE 3 Perimeter and Web App Exploitation

  • Session Hijacking
  • Evading IDS
  • Firewalls
  • Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection

PHASE 4 Mobile, IoT, OT Exploitation

  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT Hacking
  • OT Hacking
  • Cloud Computing
  • Cryptography

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):