Course Overview
Learning Objectives
After taking this course, you will be able to:
PHASE 1 Vulnerability Assessment
- Foot Printing & Reconnaissance
- Scanning
- Enumeration
- Vulnerability Analysis
PHASE 2 Gaining Access
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
PHASE 3 Perimeter and Web App Exploitation
- Session Hijacking
- Evading IDS
- Firewalls
- Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
PHASE 4 Mobile, IoT, OT Exploitation
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- OT Hacking
- Cloud Computing
- Cryptography
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):