About the Course

Learn to understand the specialized set of tools, tactics, techniques, knowledge, skills, and abilities to facilitate the ability to think like an adversary and appropriately defend your systems. Focus on how to work with a penetration testers toolkit to identify vulnerable systems, services and configurations to identify and exploit vulnerabilities to apply the appropriate countermeasures. At the conclusion of the course, the student will be proficient in performing ethical hacking and penetration tests on computer systems, networks, services and applications.

No Sections Available