Course Overview
Learning Objectives
Upon completion of this course, the student will be able to:
• Explain the importance of planning and key aspects of compliance-based assessments
• Gather information to prepare for exploitation
• Perform a vulnerability scan and analyze results
• Exploit network, wireless, application, and RF-based vulnerabilities
• Summarize physical security attacks
• Perform post-exploitation techniques
• Conduct information gathering with various tools and perform analysis on their output
• Analyze basic scripts in Bash, Python, Ruby, and PowerShell
• Utilize report writing and handling best practices
• Explain recommended mitigation strategies for discovered vulnerabilities
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):