Loading Events
This event has passed.

In this course, students will be guided through a series of laboratories and experiments in order to explore various mechanisms to learn penetration testing, vulnerability analysis and exploit techniques utilizing common attack frameworks and tools against wired, wireless, web and social engineering examples.

They will utilize the Cloud Range in both hands-on exercises and to reinforce these concepts. They will undertake a more advanced approach in recognizing attack within internal and external systems by identifying traffic flows and irregular traffic patterns.

Share This Story, Choose Your Platform!