A continuation of Ethical Hacking I. Special attention is paid toward topics including, but not limited to, session hijacking, evading network security appliances, web server and application hacking, IoT hacking, wireless and mobile hacking, and cloud hacking.
- Instructor: Bookert, Nyteisha
- Instructor: Brown, James