This hands-on course explores common and specialized security tools for penetration assessments. Students will have the opportunity to create their own custom tool or an extension to a known tool.
Learn how to recognize and describe cyber compliance
Discuss best practices for contextualizing past and current cyber threats
About this course:
This hands-on course explores common and specialized security tools used during penetration assessments. Beginning with an overview of the offensive attack profile, the risks associated and the strategy behind penetration testing, students will complete progressive exercises on the offensive steps taken during a professional penetration test. Topics covered will include setting up virtual machines for testing, testing methodologies, vulnerability scanning, exploitation, Metasploit and cross-site scripting (CSS). Students will have the opportunity to create their own custom tool or an extension to a known tool.
We use cookies to understand how you use our site and to improve your experience, including personalizing content and to store your content preferences. By continuing to use our site, you accept our use of cookies.
Read our privacy policy.