Enrollment options

This course provides theoretical and practical aspects of Network Penetration Testing. The course includes in-depth details and hands on labs for each of the five distinct phases of an ethical hack including reconnaissance, scanning and vulnerability assessment, gaining access and exploitation, maintaining access, and covering tracks. An applied approach with a focus on current tools and methodologies will be stressed. Special attention is paid toward topics including, but not limited to, network scanning, enumeration, and vulnerability assessment.
Guests cannot access this course. Please log in.